getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:32 executing program 2: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x200, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x80000000, 0x37d, 0xd7, 0x7}, {0x8bc4, 0x7, 0xfffffffffffffffa, 0x8}, {0xedb, 0x0, 0x5f, 0xf62}, {0x8c, 0x3, 0x100000001, 0xb5}]}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r1, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x0, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x7bdd, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8d8ec8c51883b7df489ce92dcf5f77b0fa87d46b6849c00ef987d5d6384e99ac6b225c06e584b0850277752f3d10e40584d81dd129ead93e32c1ab93c01f669c0caae6e45bd4b564aba6f595dee0389e627fc6fb3ef1c943d7e574cc55e9c579f42b61a15c48698a1409eea5886baaad0c5ae688d9da76000", [[], [], []]}, 0x447) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000200)) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r3, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r4, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000340)=0x8002) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000440)={'gre0\x00', 0x5}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000480)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f00000004c0)=0x14) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000500)={r5, 0x400}, 0x8) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r1, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = semget(0x0, 0x2, 0x81) semctl$SEM_STAT(r2, 0x0, 0x12, &(0x7f0000000080)=""/87) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000005b3fb20de5b109c2e56c4dad977c72f49740632c8e55a3440aac4468bb92b8b1dab8c28ff83eb0c768ad4adb352e7fe7264b9c547b30ac7251f1f9744d772522a288f3c4a37ccb5f55c043a58c54c27918e4a4efd247564af0a7628d124667e52ff829dd637e27a5b5b2baee6cb5ccc9cd0cce0bf96c6ba7e73df2a449fb476d81251afbfb5219704f918a1bd2a4a0662741cad9f1902151fd218e687807e9993404be61a6002f", @ANYRES16=r1, @ANYBLOB="210200000000000000000f000000"], 0x14}}, 0x0) [ 546.133230] FAULT_INJECTION: forcing a failure. [ 546.133230] name fail_futex, interval 1, probability 0, space 0, times 0 [ 546.145210] CPU: 0 PID: 22636 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 546.152638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 546.162011] Call Trace: [ 546.164660] dump_stack+0x244/0x39d [ 546.168341] ? dump_stack_print_info.cold.1+0x20/0x20 [ 546.173575] should_fail.cold.4+0xa/0x17 [ 546.177665] ? do_syscall_64+0x1b9/0x820 [ 546.181740] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 546.186870] ? find_held_lock+0x36/0x1c0 [ 546.190952] ? __task_pid_nr_ns+0x301/0x640 [ 546.195294] ? lock_downgrade+0x900/0x900 [ 546.199465] ? check_preemption_disabled+0x48/0x280 [ 546.204497] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 546.209439] ? kasan_check_read+0x11/0x20 [ 546.213598] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 546.218899] ? rcu_softirq_qs+0x20/0x20 [ 546.222896] ? __task_pid_nr_ns+0x328/0x640 [ 546.227226] ? delayed_put_pid+0x30/0x30 [ 546.231302] ? lock_acquire+0x1ed/0x520 [ 546.235321] ? futex_lock_pi+0x320/0x1060 [ 546.239525] futex_lock_pi_atomic+0xe4/0x3a0 [ 546.243951] ? attach_to_pi_state+0x430/0x430 [ 546.248469] futex_lock_pi+0x34c/0x1060 [ 546.252464] ? futex_wait_restart+0x290/0x290 [ 546.256973] ? print_usage_bug+0xc0/0xc0 [ 546.261175] ? rcu_softirq_qs+0x20/0x20 [ 546.265211] ? dput.part.25+0x241/0x860 [ 546.269214] ? lock_downgrade+0x900/0x900 [ 546.269235] ? check_preemption_disabled+0x48/0x280 [ 546.269261] ? mark_held_locks+0x130/0x130 [ 546.269281] ? print_usage_bug+0xc0/0xc0 [ 546.286742] ? __lock_acquire+0x62f/0x4c20 [ 546.291027] ? find_held_lock+0x36/0x1c0 [ 546.295104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 546.300649] ? _parse_integer+0x134/0x180 [ 546.304813] ? zap_class+0x640/0x640 [ 546.308579] do_futex+0x340/0x26d0 [ 546.312132] ? zap_class+0x640/0x640 [ 546.315861] ? lock_release+0xa00/0xa00 [ 546.319977] ? perf_trace_sched_process_exec+0x860/0x860 [ 546.325458] ? exit_robust_list+0x280/0x280 [ 546.329800] ? get_pid_task+0xd6/0x1a0 05:30:32 executing program 2: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x80000000, 0x37d, 0xd7, 0x7}, {0x8bc4, 0x7, 0xfffffffffffffffa, 0x8}, {0xedb, 0x0, 0x5f, 0xf62}, {0x8c, 0x3, 0x100000001, 0xb5}]}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x0, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x7bdd, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8d8ec8c51883b7df489ce92dcf5f77b0fa87d46b6849c00ef987d5d6384e99ac6b225c06e584b0850277752f3d10e40584d81dd129ead93e32c1ab93c01f669c0caae6e45bd4b564aba6f595dee0389e627fc6fb3ef1c943d7e574cc55e9c579f42b61a15c48698a1409eea5886baaad0c5ae688d9da76000", [[], [], []]}, 0x447) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x100) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000440)={'nat\x00', 0x2, [{}, {}]}, 0x48) 05:30:32 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(0xffffffffffffffff, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:32 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x6, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") [ 546.333703] ? lock_downgrade+0x900/0x900 [ 546.337872] ? check_preemption_disabled+0x48/0x280 [ 546.342908] ? find_held_lock+0x36/0x1c0 [ 546.346991] ? __f_unlock_pos+0x19/0x20 [ 546.351032] ? lock_downgrade+0x900/0x900 [ 546.355205] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 546.360754] ? proc_fail_nth_write+0x9e/0x210 [ 546.360772] ? proc_cwd_link+0x1d0/0x1d0 [ 546.360795] ? find_held_lock+0x36/0x1c0 [ 546.360817] ? kasan_check_write+0x14/0x20 [ 546.360835] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 546.360854] ? wait_for_completion+0x8a0/0x8a0 [ 546.387178] ? __lock_is_held+0xb5/0x140 [ 546.391258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 546.396824] ? check_preemption_disabled+0x48/0x280 [ 546.401872] ? __sb_end_write+0xd9/0x110 [ 546.405955] __x64_sys_futex+0x472/0x6a0 [ 546.410100] ? do_futex+0x26d0/0x26d0 [ 546.413913] ? trace_hardirqs_on+0xbd/0x310 [ 546.418242] ? __ia32_sys_read+0xb0/0xb0 [ 546.422320] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 546.427697] ? trace_hardirqs_off_caller+0x310/0x310 05:30:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) write$selinux_validatetrans(r1, &(0x7f0000000480)={'system_u:object_r:dhcpc_state_t:s0', 0x20, 'system_u:object_r:ssh_exec_t:s0', 0x20, 0x41, 0x20, '/usr/sbin/cupsd\x00'}, 0x68) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r2, 0x221, 0x0, 0x0, {0xf}}, 0x14}}, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1d) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x28000, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000200)=""/78) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2040000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="f8dcb69b39f23fbb337c314c64000000baf62cb3d4de9090555356ade24f64460c421aea12755da03c0e6136ef9aa8287ae19ba1d69f43dd4f4deeddf640948529a0b7aeb08e1620f8d298785f89cb74b9e5a56cdc6436f6110f959dc57f8fbbcc28feb96ac1ebfaf8b849bf8be643fb932fe9299b09c4878e1b9a09c2c063b9ccc77326e02740197688afe8c15b9f07dddf2e097d7d1fbde8397b45dd5752e1b10c612bcc33336a6dd082b12d695aec46566ec708bccfb1d8e270", @ANYRES16=r2, @ANYBLOB="00092bbd7000ffdbdf250c000000140002000800070001000000080003000300000020000300140006000000000000000000000000000000000108000500ffffffff140001000800010002000000080004004e2300000800060005000000"], 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x10) [ 546.432872] do_syscall_64+0x1b9/0x820 [ 546.436772] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 546.442151] ? syscall_return_slowpath+0x5e0/0x5e0 [ 546.447099] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 546.451965] ? trace_hardirqs_on_caller+0x310/0x310 [ 546.457037] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 546.462070] ? prepare_exit_to_usermode+0x291/0x3b0 [ 546.467112] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 546.471980] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 546.477195] RIP: 0033:0x457669 [ 546.480396] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 546.499306] RSP: 002b:00007f24b938cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 546.507040] RAX: ffffffffffffffda RBX: 00007f24b938cc90 RCX: 0000000000457669 [ 546.514320] RDX: 0000000000000000 RSI: 0000800000000008 RDI: 000000002000cffc [ 546.521595] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 546.528888] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24b938d6d4 [ 546.536172] R13: 00000000004be03f R14: 00000000004cde70 R15: 0000000000000004 05:30:34 executing program 3: setresuid(0x0, 0xee01, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) 05:30:34 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x8, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:34 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(0xffffffffffffffff, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x3) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e24, 0x1, @dev={0xfe, 0x80, [], 0x15}, 0x8}}, 0x3, 0x400, 0x100000000000000, 0x0, 0x5}, 0x98) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000000c0)=0x0) waitid(0x1, r4, &(0x7f00000001c0), 0xa0000003, &(0x7f0000000340)) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB], 0x14}}, 0x0) 05:30:34 executing program 5 (fault-call:2 fault-nth:4): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:34 executing program 2: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x4000, 0x0) pipe2(&(0x7f0000000580), 0x84800) socket$inet6(0xa, 0x80000, 0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001100)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x80000000, 0x37d, 0xd7, 0x7}, {0x8bc4, 0x7, 0xfffffffffffffffa, 0x8}, {0xedb, 0x0, 0x5f, 0xf62}, {0x8c, 0x3, 0x100000001, 0xb5}]}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r1, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x0, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x7bdd, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8d8ec8c51883b7df489ce92dcf5f77b0fa87d46b6849c00ef987d5d6384e99ac6b225c06e584b0850277752f3d10e40584d81dd129ead93e32c1ab93c01f669c0caae6e45bd4b564aba6f595dee0389e627fc6fb3ef1c943d7e574cc55e9c579f42b61a15c48698a1409eea5886baaad0c5ae688d9da76000", [[], [], []]}, 0x447) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000200)) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r3, 0x541c, &(0x7f0000000140)={0x2, 0x8f17, 0x40000100000001, 0x5f95, 0x1, 0x9}) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r4, 0x29, 0x45, &(0x7f0000000440)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r1, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") [ 548.736370] FAULT_INJECTION: forcing a failure. [ 548.736370] name fail_futex, interval 1, probability 0, space 0, times 0 [ 548.747901] CPU: 0 PID: 22675 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 548.755277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.764659] Call Trace: [ 548.767281] dump_stack+0x244/0x39d [ 548.770946] ? dump_stack_print_info.cold.1+0x20/0x20 [ 548.776168] should_fail.cold.4+0xa/0x17 [ 548.780249] ? do_syscall_64+0x1b9/0x820 [ 548.784320] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 548.789433] ? find_held_lock+0x36/0x1c0 [ 548.793518] ? __task_pid_nr_ns+0x301/0x640 [ 548.797861] ? lock_downgrade+0x900/0x900 [ 548.802051] ? check_preemption_disabled+0x48/0x280 [ 548.807090] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 548.812048] ? kasan_check_read+0x11/0x20 [ 548.816208] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 548.821498] ? rcu_softirq_qs+0x20/0x20 [ 548.825502] ? __task_pid_nr_ns+0x328/0x640 [ 548.829848] ? delayed_put_pid+0x30/0x30 [ 548.833945] ? lock_acquire+0x1ed/0x520 [ 548.837930] ? futex_lock_pi+0x320/0x1060 [ 548.842098] futex_lock_pi_atomic+0x158/0x3a0 [ 548.846610] ? attach_to_pi_state+0x430/0x430 [ 548.851125] futex_lock_pi+0x34c/0x1060 [ 548.855119] ? futex_wait_restart+0x290/0x290 [ 548.859632] ? print_usage_bug+0xc0/0xc0 [ 548.863716] ? rcu_softirq_qs+0x20/0x20 [ 548.867720] ? dput.part.25+0x241/0x860 [ 548.871742] ? lock_downgrade+0x900/0x900 [ 548.875905] ? check_preemption_disabled+0x48/0x280 [ 548.880943] ? mark_held_locks+0x130/0x130 05:30:35 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0xc, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") [ 548.885200] ? print_usage_bug+0xc0/0xc0 [ 548.889271] ? __lock_acquire+0x62f/0x4c20 [ 548.889318] ? find_held_lock+0x36/0x1c0 [ 548.889336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 548.889356] ? _parse_integer+0x134/0x180 [ 548.903212] ? zap_class+0x640/0x640 [ 548.903233] do_futex+0x340/0x26d0 [ 548.903251] ? zap_class+0x640/0x640 [ 548.903268] ? lock_release+0xa00/0xa00 [ 548.903283] ? perf_trace_sched_process_exec+0x860/0x860 [ 548.903307] ? exit_robust_list+0x280/0x280 [ 548.932186] ? get_pid_task+0xd6/0x1a0 [ 548.936088] ? lock_downgrade+0x900/0x900 [ 548.940255] ? check_preemption_disabled+0x48/0x280 [ 548.945296] ? find_held_lock+0x36/0x1c0 [ 548.949382] ? __f_unlock_pos+0x19/0x20 [ 548.953378] ? lock_downgrade+0x900/0x900 [ 548.957549] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 548.963104] ? proc_fail_nth_write+0x9e/0x210 [ 548.967619] ? proc_cwd_link+0x1d0/0x1d0 [ 548.971705] ? find_held_lock+0x36/0x1c0 [ 548.975786] ? kasan_check_write+0x14/0x20 [ 548.980066] ? __mutex_unlock_slowpath+0x197/0x8c0 05:30:35 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") [ 548.985035] ? wait_for_completion+0x8a0/0x8a0 [ 548.989639] ? __lock_is_held+0xb5/0x140 [ 548.993743] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 548.999300] ? check_preemption_disabled+0x48/0x280 [ 549.004358] ? __sb_end_write+0xd9/0x110 [ 549.008432] __x64_sys_futex+0x472/0x6a0 [ 549.012507] ? do_futex+0x26d0/0x26d0 [ 549.016356] ? trace_hardirqs_on+0xbd/0x310 [ 549.020718] ? __ia32_sys_read+0xb0/0xb0 [ 549.024805] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.030186] ? trace_hardirqs_off_caller+0x310/0x310 [ 549.035316] do_syscall_64+0x1b9/0x820 [ 549.039209] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 549.039230] ? syscall_return_slowpath+0x5e0/0x5e0 [ 549.039247] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 549.039265] ? trace_hardirqs_on_caller+0x310/0x310 [ 549.039284] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 549.039305] ? prepare_exit_to_usermode+0x291/0x3b0 [ 549.049587] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 549.049611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.049623] RIP: 0033:0x457669 [ 549.049640] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 549.049648] RSP: 002b:00007f24b938cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 549.049694] RAX: ffffffffffffffda RBX: 00007f24b938cc90 RCX: 0000000000457669 [ 549.049704] RDX: 0000000000000000 RSI: 0000800000000008 RDI: 000000002000cffc [ 549.049713] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 05:30:35 executing program 2: r0 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) r1 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x80000000, 0x37d, 0xd7, 0x7}, {0x8bc4, 0x7, 0xfffffffffffffffa, 0x8}, {0xedb, 0x0, 0x5f, 0xf62}, {0x8c, 0x3, 0x100000001, 0xb5}]}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r1, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x447) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000200)) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r3, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000440)={0x0, 0x0, 0x8, 0x0, [], [{0x0, 0xae, 0x3, 0x2, 0x8, 0x1}, {0xffff, 0xa911, 0x9, 0x2, 0x7c0d4fe0, 0x8}], [[], [], [], [], [], [], [], []]}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000700)) getsockopt$IP6T_SO_GET_REVISION_TARGET(r4, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r1, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") [ 549.049722] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24b938d6d4 [ 549.049736] R13: 00000000004be03f R14: 00000000004cde70 R15: 0000000000000004 05:30:35 executing program 5 (fault-call:2 fault-nth:5): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:35 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") [ 549.374375] FAULT_INJECTION: forcing a failure. [ 549.374375] name fail_futex, interval 1, probability 0, space 0, times 0 [ 549.385991] CPU: 0 PID: 22709 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #157 [ 549.393384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.402749] Call Trace: [ 549.405357] dump_stack+0x244/0x39d [ 549.409066] ? dump_stack_print_info.cold.1+0x20/0x20 [ 549.414286] ? unwind_get_return_address+0x61/0xa0 [ 549.419250] should_fail.cold.4+0xa/0x17 [ 549.423333] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 549.428466] ? save_stack+0xa9/0xd0 [ 549.432108] ? zap_class+0x640/0x640 [ 549.435840] ? kasan_kmalloc+0xc7/0xe0 [ 549.439757] ? kmem_cache_alloc_trace+0x152/0x750 [ 549.444642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 549.450258] ? should_fail+0x22d/0xd01 [ 549.454166] ? do_syscall_64+0x1b9/0x820 [ 549.458247] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 549.463374] ? find_held_lock+0x36/0x1c0 [ 549.467455] ? __task_pid_nr_ns+0x301/0x640 [ 549.471793] ? lock_downgrade+0x900/0x900 [ 549.475954] ? check_preemption_disabled+0x48/0x280 [ 549.480984] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 549.485940] ? kasan_check_read+0x11/0x20 [ 549.490098] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 549.495432] ? rcu_softirq_qs+0x20/0x20 [ 549.499474] lock_pi_update_atomic+0x84/0x150 [ 549.503981] ? fault_in_user_writeable+0x90/0x90 [ 549.508797] ? lock_acquire+0x1ed/0x520 [ 549.512815] ? futex_top_waiter+0x18c/0x210 [ 549.517148] futex_lock_pi_atomic+0x22b/0x3a0 [ 549.517168] ? attach_to_pi_state+0x430/0x430 [ 549.517194] futex_lock_pi+0x34c/0x1060 [ 549.517217] ? futex_wait_restart+0x290/0x290 [ 549.517232] ? print_usage_bug+0xc0/0xc0 [ 549.517246] ? rcu_softirq_qs+0x20/0x20 [ 549.517261] ? dput.part.25+0x241/0x860 [ 549.517278] ? lock_downgrade+0x900/0x900 [ 549.517295] ? check_preemption_disabled+0x48/0x280 [ 549.517318] ? mark_held_locks+0x130/0x130 [ 549.560117] ? print_usage_bug+0xc0/0xc0 [ 549.564183] ? __lock_acquire+0x62f/0x4c20 [ 549.568453] ? find_held_lock+0x36/0x1c0 [ 549.572517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 549.578073] ? _parse_integer+0x134/0x180 [ 549.582230] ? zap_class+0x640/0x640 [ 549.585953] do_futex+0x340/0x26d0 [ 549.589501] ? zap_class+0x640/0x640 [ 549.593233] ? lock_release+0xa00/0xa00 [ 549.597213] ? perf_trace_sched_process_exec+0x860/0x860 [ 549.602677] ? exit_robust_list+0x280/0x280 [ 549.607013] ? get_pid_task+0xd6/0x1a0 [ 549.610934] ? lock_downgrade+0x900/0x900 [ 549.615090] ? check_preemption_disabled+0x48/0x280 [ 549.620120] ? find_held_lock+0x36/0x1c0 [ 549.624199] ? __f_unlock_pos+0x19/0x20 [ 549.628185] ? lock_downgrade+0x900/0x900 [ 549.632339] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 549.637881] ? proc_fail_nth_write+0x9e/0x210 [ 549.642379] ? proc_cwd_link+0x1d0/0x1d0 [ 549.646457] ? find_held_lock+0x36/0x1c0 [ 549.650532] ? kasan_check_write+0x14/0x20 [ 549.655246] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 549.660185] ? wait_for_completion+0x8a0/0x8a0 [ 549.664778] ? __lock_is_held+0xb5/0x140 [ 549.668861] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 549.674463] ? check_preemption_disabled+0x48/0x280 [ 549.679514] ? __sb_end_write+0xd9/0x110 [ 549.683597] __x64_sys_futex+0x472/0x6a0 [ 549.687685] ? do_futex+0x26d0/0x26d0 [ 549.691494] ? trace_hardirqs_on+0xbd/0x310 [ 549.695818] ? __ia32_sys_read+0xb0/0xb0 [ 549.699939] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.705306] ? trace_hardirqs_off_caller+0x310/0x310 [ 549.710429] do_syscall_64+0x1b9/0x820 [ 549.714321] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 549.719690] ? syscall_return_slowpath+0x5e0/0x5e0 [ 549.724621] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 549.729470] ? trace_hardirqs_on_caller+0x310/0x310 [ 549.734492] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 549.739518] ? prepare_exit_to_usermode+0x291/0x3b0 [ 549.744548] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 549.749421] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.754636] RIP: 0033:0x457669 [ 549.757834] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 549.776737] RSP: 002b:00007f24b938cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 549.784580] RAX: ffffffffffffffda RBX: 00007f24b938cc90 RCX: 0000000000457669 [ 549.791849] RDX: 0000000000000000 RSI: 0000800000000008 RDI: 000000002000cffc [ 549.799123] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 549.806392] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f24b938d6d4 [ 549.813679] R13: 00000000004be03f R14: 00000000004cde70 R15: 0000000000000004 05:30:36 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() ptrace(0x10, r1) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, &(0x7f00000001c0)={{0x1, 0x3, 0xffffffff, 0x5, '\x00', 0x13}, 0x1, [0x4, 0x4, 0x0, 0x1f, 0x6, 0x6, 0x3, 0x10000, 0x401, 0x8000000000000000, 0x3, 0xfffffffffffffff7, 0x100, 0x9, 0x1ff, 0x0, 0x39ee, 0x8, 0x0, 0x2, 0x0, 0xfa, 0x35e, 0x8, 0x1f, 0x6, 0x2, 0x20bf, 0x4, 0x9, 0xffffffffffff8000, 0x10000, 0x0, 0x0, 0x31f, 0x5, 0x3, 0x3, 0x7, 0x0, 0x2, 0x101, 0xfffffffffffffc13, 0x5, 0x3ff, 0x3887, 0xfca, 0x200, 0x597c3f88, 0x2, 0x20, 0x2d80, 0x7, 0x40, 0x0, 0x2, 0x3f, 0x6, 0x80000001, 0xba4, 0x10000000000, 0x1, 0x100000000, 0xb2, 0x5, 0x1, 0x7fffffff, 0x81, 0x8, 0x1, 0x7ff, 0xd2, 0x8000, 0x4, 0x0, 0x8001, 0xffffffff, 0x9, 0x2, 0x7, 0x8, 0x5, 0x0, 0xe8, 0x8, 0xfffffffffffffffc, 0x2, 0x6, 0xffffffffffff7fff, 0x8, 0x1, 0x5, 0x1ff, 0x3f, 0x92, 0x4, 0xdf, 0x0, 0x3, 0xeab, 0x1, 0x3, 0x33, 0x80000000, 0x1, 0xffffffffffff747c, 0x1, 0x7, 0x0, 0x4, 0xfffffffffffffffe, 0x4, 0x80000001, 0x4, 0x1ff, 0x0, 0x10001, 0x2, 0x401, 0xe7, 0xff, 0x2cc, 0xfffffffffffff287, 0x4, 0x0, 0x80, 0x23e9, 0x7]}) 05:30:36 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0xf, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") [ 549.834437] audit: type=1400 audit(1545197436.081:102): avc: denied { listen } for pid=22673 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:30:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x38, 0x8000000) r2 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x6bf, 0x440001) read(r2, &(0x7f0000000200)=""/146, 0x92) openat$cgroup(r2, &(0x7f0000000080)='s\xe5\a\x00', 0x200002, 0x0) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={0x0, 0xfffffffffffffe8a, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, r1, 0x221, 0x0, 0x0, {0xf}}, 0x69}}, 0x0) 05:30:36 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)={0x12}) ptrace(0x10, r1) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000040)=0x2cf) 05:30:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="4b75ebab3472408893042051e8ea36c00fe2dd765903f6e276c5d84065ae8cbc8368280c41b5e7104dea2c5d4ca068c15cb93d2b5b306b56a9712a1b659e3a57a49af498a2ca517617c8614c6cfb9afa6d3cec78e21fc24dec9c3c05247cedf310fba12a3c9634426580dc0c9de0c6bf48a6cd790c4a99da706ffcb09c3dd897ba2eedc34d2829abc408eefc09c73900000000000000f6a8c1dc7ed861985a66b7e4d26da4b6b7e3ed7f203ddd"], 0x14}}, 0x0) 05:30:36 executing program 5 (fault-call:2 fault-nth:6): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:36 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sysfs$1(0x1, &(0x7f0000000000)='vboxnet0:\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x88000, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB='\x00'], 0x14}}, 0x0) 05:30:36 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x7, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:36 executing program 2: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x80000000, 0x37d, 0xd7, 0x7}, {0x8bc4, 0x7, 0xfffffffffffffffa, 0x8}, {0xedb, 0x0, 0x5f, 0xf62}, {0x8c, 0x3, 0x100000001, 0xb5}]}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x208080, 0x0) write$FUSE_OPEN(r1, &(0x7f0000000500)={0x20, 0x0, 0x8, {0x0, 0x2}}, 0x20) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x0, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x7bdd, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8d8ec8c51883b7df489ce92dcf5f77b0fa87d46b6849c00ef987d5d6384e99ac6b225c06e584b0850277752f3d10e40584d81dd129ead93e32c1ab93c01f669c0caae6e45bd4b564aba6f595dee0389e627fc6fb3ef1c943d7e574cc55e9c579f42b61a15c48698a1409eea5886baaad0c5ae688d9da76000", [[], [], []]}, 0x447) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000200)) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f0000000440)={[{0x1, 0x70, 0xeea, 0xfffffffffffffffc, 0xfffffffffffffff9, 0x2, 0x1, 0x4, 0x1, 0x7f, 0x7, 0x6, 0x1ff}, {0x8, 0x86a, 0x2, 0x124d, 0x9, 0x7, 0xfffffffffffffffe, 0x2, 0x1bb, 0x4, 0x88}, {0xa, 0x8, 0x1, 0x8, 0x16, 0x8000, 0x100, 0xffffffff7fffffff, 0x4, 0x8, 0x9, 0x4}], 0xca}) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000540), &(0x7f0000000580)=0x4) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$TIOCLINUX2(r3, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r4, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) ioctl$SG_GET_VERSION_NUM(r3, 0x2282, &(0x7f00000005c0)) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:36 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sync_file_range(r0, 0x3, 0xa000000000000, 0x4) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, r1, 0x100, 0x70bd2d, 0x25dfdbfb, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x7, @media='udp\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4008040}, 0x4000000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="d821140000009b897f4fe32dc08e733f6aab7bca1de57eb2e0062f16704d3dcaafa29381535ace9a779bc71345c839a94ede80d82e28eb061406a826ff97b04a3da0954f6ebe7277b03b858915bf1834e3be480eb63b396e645a74b1373f05dd57b030de82f641db1031948e3b27608b36c47e1e947eab9e10188f25e85748fa45b446a116afa1071e0dbacbd5516e7c7b8a80be9c6acc8064ca806799b1a8a4118c7b400bc766415e8f272e71", @ANYRES16=r2, @ANYBLOB='?\'^'], 0x3}}, 0x0) 05:30:36 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0xa, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:36 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc)=0x64060000, 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r1, 0x221, 0x0, 0x0, {0xf}}, 0x14}}, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x200) write$selinux_load(r2, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "d968e6daed47e5fe809b28f70dee34e914b788d8a3f7f77e9c72abd46a431f1285cd86fab6a9727875af79ab890c90ea692bae63291da54c62acb571f681e014dbb72761755516db73d63a20bc310ceb20d6079b59d761074872fa66a6347bce30bc8436ca467ce9357f72a50abd359d1f76b63a0ed346b28d0e65253c66ff96fd0326e71cae52d53d676087ff0b9b7e"}, 0xa0) 05:30:37 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc)=0xfcffffff, 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:37 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0xb, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:37 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000040)={0x0, 0x1, [0x7855, 0xd5bd, 0x20, 0xffffffffffff0000, 0xfffffffffffffffc, 0x5000000, 0x1, 0x3]}) clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) ptrace(0x10, r2) 05:30:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x400000) ioctl$KDSKBLED(r2, 0x4b65, 0x40) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x14, r1, 0x221, 0x70bd2c, 0xfffffffffffffffe, {0xf}}, 0xf}}, 0x800) 05:30:37 executing program 2: r0 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) r1 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x80000000, 0x37d, 0xd7, 0x7}, {0x8bc4, 0x7, 0xfffffffffffffffa, 0x8}, {0xedb, 0x0, 0x5f, 0xf62}, {0x8c, 0x3, 0x100000001, 0xb5}]}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r1, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x447) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000200)) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r3, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000440)={0x0, 0x0, 0x8, 0x0, [], [{0x0, 0xae, 0x3, 0x2, 0x8, 0x1}, {0xffff, 0xa911, 0x9, 0x2, 0x7c0d4fe0, 0x8}], [[], [], [], [], [], [], [], []]}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000700)) getsockopt$IP6T_SO_GET_REVISION_TARGET(r4, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r1, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:37 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:37 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc)=0x6406, 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:37 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x400, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000180)={0xf, {0x400000000000000, 0x5, 0x81, 0x2}}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') fstatfs(r0, &(0x7f0000000000)=""/203) 05:30:37 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="21020000074fca0007000f008014c96d5336d50a15ffc295f5942bf2e7877843e5f4a8c95549ff9f6fb6d835fc0566ce7138ab8598d7113e72a49738bfcee966749c8f133f8c9b799f25e14e1bf745919120171a92467eb97fe4f1e62f3040c019358aef855a7595166c2c424be212ab17f77c8424"], 0x14}}, 0x0) 05:30:37 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc)=0x664, 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:37 executing program 2 (fault-call:3 fault-nth:0): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000040)=0x4100000000, 0x4) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="2b1c0691e77140318834516abbc3122b571fcb44951fbffa500e65e34bb27f32e8a54d5ff9f2f7ceddd673a95968153c7b41c4c9ae68c7605db3cad0b6c5313bb04a7b91c5b21962bd2e04617965664ed3137e9dbfe66c1243d04b185b809ed0c2fed6a83c75ca7f546d9cbfa4dbfc17124b27196292d0b58a4d231bdb657098be93bc664660b3e8388bbded6e9dd68d4c0f1989662d5b77dd4402dcda2104d3d7c7b0f41fa661f0dcf791403c05fb8b4c73891c2302bf603981c7721cd58b363a90587743e69239fb583a0a66776559d019b13f4030d8809e7e161253e67ce8257524befd4e829b1b2392d8b8bb4de4281774a178367c", @ANYRES16=r1, @ANYBLOB="210200000000000000000f000000"], 0x14}}, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000080), 0x4) [ 551.529457] FAULT_INJECTION: forcing a failure. [ 551.529457] name failslab, interval 1, probability 0, space 0, times 0 [ 551.541153] CPU: 0 PID: 22831 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #157 [ 551.548529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.557888] Call Trace: [ 551.560485] dump_stack+0x244/0x39d [ 551.564127] ? dump_stack_print_info.cold.1+0x20/0x20 [ 551.569338] should_fail.cold.4+0xa/0x17 [ 551.573413] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 551.578540] ? print_usage_bug+0xc0/0xc0 [ 551.582602] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 551.587882] ? print_usage_bug+0xc0/0xc0 [ 551.591980] ? __mutex_lock+0x85e/0x16f0 [ 551.596133] ? tun_get_user+0x1db5/0x4250 [ 551.600295] ? mark_held_locks+0x130/0x130 [ 551.604534] ? mutex_trylock+0x2b0/0x2b0 [ 551.608611] ? mark_held_locks+0x130/0x130 [ 551.612848] ? print_usage_bug+0xc0/0xc0 [ 551.616910] ? up_write+0x7b/0x220 [ 551.620471] ? print_usage_bug+0xc0/0xc0 [ 551.624534] __should_failslab+0x124/0x180 [ 551.628802] should_failslab+0x9/0x14 [ 551.632603] kmem_cache_alloc+0x47/0x730 [ 551.636666] ? __lock_acquire+0x62f/0x4c20 [ 551.640913] __build_skb+0xab/0x430 [ 551.644541] ? skb_try_coalesce+0x1b70/0x1b70 [ 551.649102] ? __alloc_pages_nodemask+0xea0/0xea0 [ 551.654449] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 551.659992] ? check_preemption_disabled+0x48/0x280 [ 551.665079] __napi_alloc_skb+0x1d6/0x310 [ 551.669239] napi_get_frags+0x67/0x140 [ 551.673177] tun_get_user+0x1e1f/0x4250 [ 551.677165] ? lock_downgrade+0x900/0x900 [ 551.681313] ? check_preemption_disabled+0x48/0x280 [ 551.686354] ? tun_net_xmit+0x1c90/0x1c90 [ 551.690498] ? zap_class+0x640/0x640 [ 551.694228] ? avc_has_perm+0x55f/0x7e0 [ 551.698215] ? find_held_lock+0x36/0x1c0 [ 551.702289] ? tun_get+0x206/0x370 [ 551.705832] ? lock_downgrade+0x900/0x900 [ 551.709980] ? check_preemption_disabled+0x48/0x280 [ 551.715029] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 551.719973] ? kasan_check_read+0x11/0x20 [ 551.724140] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 551.729418] ? rcu_softirq_qs+0x20/0x20 [ 551.733437] ? tun_get+0x22d/0x370 [ 551.736980] ? tun_chr_close+0x180/0x180 [ 551.741063] ? selinux_file_open+0x5c0/0x5c0 [ 551.745483] tun_chr_write_iter+0xb9/0x160 [ 551.749720] do_iter_readv_writev+0x8b0/0xa80 [ 551.754222] ? vfs_dedupe_file_range+0x700/0x700 [ 551.758985] ? rw_verify_area+0x118/0x360 [ 551.763151] do_iter_write+0x185/0x5f0 [ 551.767047] ? dup_iter+0x260/0x260 [ 551.770675] ? proc_cwd_link+0x1d0/0x1d0 [ 551.774767] vfs_writev+0x1f1/0x360 [ 551.778417] ? vfs_iter_write+0xb0/0xb0 [ 551.782409] ? wait_for_completion+0x8a0/0x8a0 [ 551.787176] ? __lock_is_held+0xb5/0x140 [ 551.791253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 551.796790] ? __fdget_pos+0xde/0x200 [ 551.800604] ? __fdget_raw+0x20/0x20 [ 551.804326] ? __sb_end_write+0xd9/0x110 [ 551.808397] do_writev+0x11a/0x310 [ 551.811945] ? vfs_writev+0x360/0x360 [ 551.815771] ? trace_hardirqs_off_caller+0x310/0x310 [ 551.820889] __x64_sys_writev+0x75/0xb0 [ 551.824878] do_syscall_64+0x1b9/0x820 [ 551.828767] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 551.834130] ? syscall_return_slowpath+0x5e0/0x5e0 [ 551.839062] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 551.843907] ? trace_hardirqs_on_caller+0x310/0x310 [ 551.848925] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 551.853954] ? prepare_exit_to_usermode+0x291/0x3b0 [ 551.858977] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 551.863882] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 551.869067] RIP: 0033:0x457521 [ 551.872260] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 551.891159] RSP: 002b:00007f2e79b63ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 551.898868] RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 0000000000457521 [ 551.906136] RDX: 0000000000000001 RSI: 00007f2e79b63bf0 RDI: 00000000000000f0 [ 551.913413] RBP: 00000000200008c0 R08: 00000000000000f0 R09: 0000000000000000 [ 551.920685] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f2e79b646d4 05:30:38 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0xd, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") [ 551.927953] R13: 00000000004c53b4 R14: 00000000004d9900 R15: 0000000000000005 05:30:38 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) sched_setscheduler(r2, 0x0, &(0x7f0000000040)=0x6) clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000140)) ptrace(0x10, r3) 05:30:38 executing program 1: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:38 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc)=0xfffffffc, 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:38 executing program 2 (fault-call:3 fault-nth:1): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000040)=""/223) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r1, 0x221, 0x0, 0x0, {0xf}}, 0x14}}, 0x0) 05:30:38 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc)=0xfcffffff00000000, 0x800000000008, 0x0, 0x0, 0x0, 0x0) [ 552.193586] FAULT_INJECTION: forcing a failure. [ 552.193586] name failslab, interval 1, probability 0, space 0, times 0 [ 552.205175] CPU: 1 PID: 22858 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #157 [ 552.212565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.221920] Call Trace: [ 552.224544] dump_stack+0x244/0x39d [ 552.228202] ? dump_stack_print_info.cold.1+0x20/0x20 [ 552.233409] ? __lock_acquire+0x62f/0x4c20 [ 552.237659] ? print_usage_bug+0xc0/0xc0 [ 552.241736] should_fail.cold.4+0xa/0x17 [ 552.245811] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 552.250924] ? print_usage_bug+0xc0/0xc0 [ 552.255016] ? zap_class+0x640/0x640 [ 552.258760] ? print_usage_bug+0xc0/0xc0 [ 552.262833] ? lock_downgrade+0x900/0x900 [ 552.267013] ? find_held_lock+0x36/0x1c0 [ 552.271180] ? __nf_conntrack_find_get.part.44+0x10de/0x1cf0 [ 552.277003] ? lock_downgrade+0x900/0x900 [ 552.281169] ? check_preemption_disabled+0x48/0x280 [ 552.286202] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 552.291151] ? kasan_check_read+0x11/0x20 [ 552.291186] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 552.300631] __should_failslab+0x124/0x180 [ 552.300650] should_failslab+0x9/0x14 [ 552.300664] kmem_cache_alloc+0x47/0x730 [ 552.300683] ? __nf_conntrack_find_get.part.44+0x1105/0x1cf0 [ 552.318552] __nf_conntrack_alloc+0x1aa/0x7c0 [ 552.323065] ? early_drop+0xc40/0xc40 [ 552.326881] ? __skb_checksum_complete_head+0x360/0x360 [ 552.332261] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 552.332279] ? icmp_invert_tuple+0x1e7/0x250 [ 552.332298] ? icmp_packet+0x420/0x420 [ 552.346126] init_conntrack.isra.47+0xff6/0x13c0 [ 552.350918] ? icmp_pkt_to_tuple+0x25d/0x330 [ 552.350953] ? nf_conntrack_alloc+0x50/0x50 [ 552.350984] ? lock_acquire+0x1ed/0x520 [ 552.363685] ? nf_conntrack_in+0x5de/0x13b0 [ 552.368024] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 552.373566] ? check_preemption_disabled+0x48/0x280 [ 552.378608] ? kasan_check_read+0x11/0x20 [ 552.382757] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 552.388041] ? trace_hardirqs_off_caller+0x310/0x310 [ 552.393154] nf_conntrack_in+0xc7d/0x13b0 [ 552.397305] ? __local_bh_enable_ip+0x160/0x260 [ 552.401991] ? nf_conntrack_update+0xbc0/0xbc0 [ 552.406692] ? __do_replace+0xab0/0xab0 [ 552.410720] ? zap_class+0x640/0x640 [ 552.414439] ? lock_acquire+0x1c0/0x520 [ 552.418423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 552.423975] ? ipv6_confirm+0x650/0x650 [ 552.427958] ipv4_conntrack_in+0x1d/0x30 [ 552.432033] nf_hook_slow+0xc2/0x1c0 [ 552.435788] ip_rcv+0x387/0x600 [ 552.439082] ? ip_local_deliver+0x750/0x750 [ 552.443465] ? pvclock_read_flags+0x160/0x160 [ 552.447973] ? ip_rcv_finish_core.isra.16+0x1f40/0x1f40 [ 552.453352] ? lock_acquire+0x1ed/0x520 [ 552.457362] __netif_receive_skb_one_core+0x14d/0x200 [ 552.462557] ? __netif_receive_skb_core+0x3b30/0x3b30 [ 552.467747] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 552.473043] ? rcu_softirq_qs+0x20/0x20 [ 552.477034] __netif_receive_skb+0x2c/0x1e0 [ 552.481360] netif_receive_skb_internal+0x12c/0x800 [ 552.486388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 552.491925] ? dev_cpu_dead+0xac0/0xac0 [ 552.495908] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 552.501473] ? eth_type_trans+0x2ea/0x760 [ 552.505625] ? eth_gro_receive+0x920/0x920 [ 552.509872] napi_gro_frags+0x75a/0xc90 [ 552.513854] ? napi_gro_receive+0x5f0/0x5f0 [ 552.518179] ? eth_get_headlen+0x173/0x1f0 [ 552.522429] ? eth_type_trans+0x760/0x760 [ 552.526582] ? tun_get_user+0x3160/0x4250 [ 552.530749] tun_get_user+0x3189/0x4250 [ 552.534731] ? lock_downgrade+0x900/0x900 [ 552.538914] ? check_preemption_disabled+0x48/0x280 [ 552.543958] ? tun_net_xmit+0x1c90/0x1c90 [ 552.548110] ? zap_class+0x640/0x640 [ 552.551835] ? avc_has_perm+0x55f/0x7e0 [ 552.555816] ? find_held_lock+0x36/0x1c0 [ 552.559888] ? tun_get+0x206/0x370 [ 552.563428] ? lock_downgrade+0x900/0x900 [ 552.567574] ? check_preemption_disabled+0x48/0x280 [ 552.572615] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 552.577545] ? kasan_check_read+0x11/0x20 [ 552.581695] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 552.586970] ? rcu_softirq_qs+0x20/0x20 [ 552.590959] ? tun_get+0x22d/0x370 [ 552.594496] ? tun_chr_close+0x180/0x180 [ 552.598563] ? selinux_file_open+0x5c0/0x5c0 [ 552.602977] tun_chr_write_iter+0xb9/0x160 [ 552.607221] do_iter_readv_writev+0x8b0/0xa80 [ 552.611718] ? vfs_dedupe_file_range+0x700/0x700 [ 552.616482] ? rw_verify_area+0x118/0x360 [ 552.620634] do_iter_write+0x185/0x5f0 [ 552.624526] ? dup_iter+0x260/0x260 [ 552.628155] ? __switch_to_asm+0x40/0x70 [ 552.632215] ? __switch_to_asm+0x40/0x70 [ 552.636284] vfs_writev+0x1f1/0x360 [ 552.639916] ? vfs_iter_write+0xb0/0xb0 [ 552.643911] ? __sched_text_start+0x8/0x8 [ 552.648065] ? wait_for_completion+0x8a0/0x8a0 [ 552.652656] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 552.657436] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 552.662057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 552.667594] ? __fdget_pos+0xde/0x200 [ 552.671449] ? __fdget_raw+0x20/0x20 [ 552.675192] ? __sb_end_write+0xd9/0x110 [ 552.679267] do_writev+0x11a/0x310 [ 552.682813] ? vfs_writev+0x360/0x360 [ 552.686627] __x64_sys_writev+0x75/0xb0 [ 552.690624] do_syscall_64+0x1b9/0x820 [ 552.694509] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 552.699889] ? syscall_return_slowpath+0x5e0/0x5e0 [ 552.704834] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 552.709682] ? trace_hardirqs_on_caller+0x310/0x310 [ 552.714702] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 552.719724] ? prepare_exit_to_usermode+0x291/0x3b0 [ 552.724746] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 552.729618] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.734832] RIP: 0033:0x457521 [ 552.738041] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 552.756958] RSP: 002b:00007f2e79b63ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 552.764676] RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 0000000000457521 [ 552.771944] RDX: 0000000000000001 RSI: 00007f2e79b63bf0 RDI: 00000000000000f0 [ 552.779210] RBP: 00000000200008c0 R08: 00000000000000f0 R09: 0000000000000000 [ 552.786922] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f2e79b646d4 05:30:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="210200000000000000000f000000d0f311a7860a232fac72ae560d5dd3dbba51e31c72c23d0d1c1178a8dd4bdf2253b388c000000000000000000000000000000000"], 0x14}}, 0x0) 05:30:39 executing program 1: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:39 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x4, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:39 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc)=0x8000000000000000, 0x800000000008, 0x0, 0x0, 0x0, 0x0) [ 552.794203] R13: 00000000004c53b4 R14: 00000000004d9900 R15: 0000000000000005 05:30:39 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) getpid() 05:30:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x35, &(0x7f0000000080)=0x1, 0x4) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x14, r1, 0x221, 0x0, 0x0, {0xf}}, 0x14}}, 0x0) 05:30:39 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:39 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc)=0x6406000000000000, 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:39 executing program 0 (fault-call:3 fault-nth:0): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) [ 553.189259] FAULT_INJECTION: forcing a failure. [ 553.189259] name failslab, interval 1, probability 0, space 0, times 0 [ 553.200613] CPU: 1 PID: 22903 Comm: syz-executor0 Not tainted 4.20.0-rc7+ #157 [ 553.207983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.217352] Call Trace: [ 553.219957] dump_stack+0x244/0x39d [ 553.223620] ? dump_stack_print_info.cold.1+0x20/0x20 [ 553.228859] should_fail.cold.4+0xa/0x17 [ 553.232962] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 553.238105] ? print_usage_bug+0xc0/0xc0 [ 553.242208] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 553.247493] ? print_usage_bug+0xc0/0xc0 [ 553.251596] ? __mutex_lock+0x85e/0x16f0 [ 553.255700] ? tun_get_user+0x1db5/0x4250 [ 553.259895] ? mark_held_locks+0x130/0x130 [ 553.264149] ? mutex_trylock+0x2b0/0x2b0 [ 553.268255] ? mark_held_locks+0x130/0x130 [ 553.272523] ? print_usage_bug+0xc0/0xc0 [ 553.276600] ? up_write+0x7b/0x220 [ 553.280153] ? print_usage_bug+0xc0/0xc0 [ 553.284249] __should_failslab+0x124/0x180 [ 553.288538] should_failslab+0x9/0x14 [ 553.292388] kmem_cache_alloc+0x47/0x730 [ 553.296462] ? __lock_acquire+0x62f/0x4c20 [ 553.300725] __build_skb+0xab/0x430 [ 553.304389] ? skb_try_coalesce+0x1b70/0x1b70 [ 553.308894] ? __alloc_pages_nodemask+0xea0/0xea0 [ 553.313740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.319285] ? check_preemption_disabled+0x48/0x280 [ 553.324314] __napi_alloc_skb+0x1d6/0x310 [ 553.328468] napi_get_frags+0x67/0x140 [ 553.332380] tun_get_user+0x1e1f/0x4250 [ 553.336360] ? lock_downgrade+0x900/0x900 [ 553.340506] ? check_preemption_disabled+0x48/0x280 [ 553.345550] ? tun_net_xmit+0x1c90/0x1c90 [ 553.349693] ? zap_class+0x640/0x640 [ 553.353416] ? avc_has_perm+0x55f/0x7e0 [ 553.357437] ? find_held_lock+0x36/0x1c0 [ 553.361533] ? tun_get+0x206/0x370 [ 553.365094] ? lock_downgrade+0x900/0x900 [ 553.369237] ? check_preemption_disabled+0x48/0x280 [ 553.374248] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 553.379284] ? kasan_check_read+0x11/0x20 [ 553.383429] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 553.388722] ? rcu_softirq_qs+0x20/0x20 [ 553.392726] ? tun_get+0x22d/0x370 [ 553.396274] ? tun_chr_close+0x180/0x180 [ 553.400340] ? selinux_file_open+0x5c0/0x5c0 [ 553.404754] tun_chr_write_iter+0xb9/0x160 [ 553.409007] do_iter_readv_writev+0x8b0/0xa80 [ 553.413512] ? vfs_dedupe_file_range+0x700/0x700 [ 553.418283] ? rw_verify_area+0x118/0x360 [ 553.422433] do_iter_write+0x185/0x5f0 [ 553.426321] ? dup_iter+0x260/0x260 [ 553.429963] ? proc_cwd_link+0x1d0/0x1d0 [ 553.434042] vfs_writev+0x1f1/0x360 [ 553.437675] ? vfs_iter_write+0xb0/0xb0 [ 553.441658] ? wait_for_completion+0x8a0/0x8a0 [ 553.446247] ? __lock_is_held+0xb5/0x140 [ 553.450319] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.455859] ? __fdget_pos+0xde/0x200 [ 553.459666] ? __fdget_raw+0x20/0x20 [ 553.463386] ? __sb_end_write+0xd9/0x110 [ 553.467459] do_writev+0x11a/0x310 [ 553.471013] ? vfs_writev+0x360/0x360 [ 553.474823] ? trace_hardirqs_off_caller+0x310/0x310 [ 553.479933] __x64_sys_writev+0x75/0xb0 [ 553.483912] do_syscall_64+0x1b9/0x820 [ 553.487802] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 553.493168] ? syscall_return_slowpath+0x5e0/0x5e0 [ 553.498102] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 553.502950] ? trace_hardirqs_on_caller+0x310/0x310 [ 553.507981] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 553.513014] ? prepare_exit_to_usermode+0x291/0x3b0 [ 553.518038] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 553.522885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.528077] RIP: 0033:0x457521 [ 553.531288] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 553.550203] RSP: 002b:00007f3cc3a98ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 553.557911] RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 0000000000457521 [ 553.565181] RDX: 0000000000000001 RSI: 00007f3cc3a98bf0 RDI: 00000000000000f0 [ 553.572450] RBP: 00000000200008c0 R08: 00000000000000f0 R09: 0000000000000000 [ 553.579717] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f3cc3a996d4 05:30:39 executing program 2 (fault-call:3 fault-nth:2): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:39 executing program 1: perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:39 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x5, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") [ 553.586985] R13: 00000000004c53b4 R14: 00000000004d9900 R15: 0000000000000005 [ 553.638728] FAULT_INJECTION: forcing a failure. [ 553.638728] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 553.650566] CPU: 0 PID: 22908 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #157 [ 553.658372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.667727] Call Trace: [ 553.670335] dump_stack+0x244/0x39d [ 553.673986] ? dump_stack_print_info.cold.1+0x20/0x20 [ 553.679244] should_fail.cold.4+0xa/0x17 [ 553.683330] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 553.688447] ? __lock_acquire+0x62f/0x4c20 [ 553.692689] ? attach_entity_load_avg+0x860/0x860 [ 553.697576] ? mark_held_locks+0x130/0x130 [ 553.701812] ? print_usage_bug+0xc0/0xc0 [ 553.705877] ? attach_entity_load_avg+0x860/0x860 [ 553.710730] ? print_usage_bug+0xc0/0xc0 [ 553.714796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.720364] ? should_fail+0x22d/0xd01 [ 553.724260] ? __lock_acquire+0x62f/0x4c20 [ 553.728514] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 553.733752] ? zap_class+0x640/0x640 [ 553.737472] __alloc_pages_nodemask+0x366/0xea0 [ 553.742152] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 553.747270] ? print_usage_bug+0xc0/0xc0 [ 553.751334] ? find_held_lock+0x36/0x1c0 [ 553.755421] ? find_held_lock+0x36/0x1c0 [ 553.759500] ? __nf_conntrack_find_get.part.44+0x10de/0x1cf0 [ 553.765306] ? trace_hardirqs_off+0xb8/0x310 [ 553.769745] cache_grow_begin+0xa5/0x8c0 [ 553.773807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.779349] ? check_preemption_disabled+0x48/0x280 [ 553.784470] kmem_cache_alloc+0x66b/0x730 [ 553.788649] __nf_conntrack_alloc+0x1aa/0x7c0 [ 553.793164] ? early_drop+0xc40/0xc40 [ 553.796968] ? __skb_checksum_complete_head+0x360/0x360 [ 553.802340] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 553.807903] ? icmp_invert_tuple+0x1e7/0x250 [ 553.812310] ? icmp_packet+0x420/0x420 [ 553.816202] init_conntrack.isra.47+0xff6/0x13c0 [ 553.820955] ? icmp_pkt_to_tuple+0x25d/0x330 [ 553.825365] ? nf_conntrack_alloc+0x50/0x50 [ 553.829711] ? lock_acquire+0x1ed/0x520 [ 553.833740] ? nf_conntrack_in+0x5de/0x13b0 [ 553.838071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.843608] ? check_preemption_disabled+0x48/0x280 [ 553.848644] ? kasan_check_read+0x11/0x20 [ 553.852787] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 553.858065] ? trace_hardirqs_off_caller+0x310/0x310 [ 553.863173] nf_conntrack_in+0xc7d/0x13b0 [ 553.867326] ? __local_bh_enable_ip+0x160/0x260 [ 553.872022] ? nf_conntrack_update+0xbc0/0xbc0 [ 553.876621] ? __do_replace+0xab0/0xab0 [ 553.880593] ? zap_class+0x640/0x640 [ 553.884325] ? lock_acquire+0x1c0/0x520 [ 553.888330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.893881] ? ipv6_confirm+0x650/0x650 [ 553.897880] ipv4_conntrack_in+0x1d/0x30 [ 553.901943] nf_hook_slow+0xc2/0x1c0 [ 553.905660] ip_rcv+0x387/0x600 [ 553.908958] ? ip_local_deliver+0x750/0x750 [ 553.913297] ? pvclock_read_flags+0x160/0x160 [ 553.917796] ? ip_rcv_finish_core.isra.16+0x1f40/0x1f40 [ 553.923169] ? lock_acquire+0x1ed/0x520 [ 553.927154] __netif_receive_skb_one_core+0x14d/0x200 [ 553.932347] ? __netif_receive_skb_core+0x3b30/0x3b30 [ 553.937554] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 553.942832] ? rcu_softirq_qs+0x20/0x20 [ 553.946815] __netif_receive_skb+0x2c/0x1e0 [ 553.951142] netif_receive_skb_internal+0x12c/0x800 [ 553.956158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.961693] ? dev_cpu_dead+0xac0/0xac0 [ 553.965676] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 553.971231] ? eth_type_trans+0x2ea/0x760 [ 553.975376] ? eth_gro_receive+0x920/0x920 [ 553.979614] napi_gro_frags+0x75a/0xc90 [ 553.983593] ? napi_gro_receive+0x5f0/0x5f0 [ 553.987940] ? eth_get_headlen+0x173/0x1f0 [ 553.992174] ? eth_type_trans+0x760/0x760 [ 553.996329] ? tun_get_user+0x3160/0x4250 [ 554.000523] tun_get_user+0x3189/0x4250 [ 554.004506] ? lock_downgrade+0x900/0x900 [ 554.008656] ? check_preemption_disabled+0x48/0x280 [ 554.013723] ? tun_net_xmit+0x1c90/0x1c90 [ 554.017869] ? zap_class+0x640/0x640 [ 554.021591] ? avc_has_perm+0x55f/0x7e0 [ 554.025574] ? find_held_lock+0x36/0x1c0 [ 554.029643] ? tun_get+0x206/0x370 [ 554.033186] ? lock_downgrade+0x900/0x900 [ 554.037332] ? check_preemption_disabled+0x48/0x280 [ 554.042349] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 554.047279] ? kasan_check_read+0x11/0x20 [ 554.051429] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 554.056733] ? rcu_softirq_qs+0x20/0x20 [ 554.060741] ? tun_get+0x22d/0x370 [ 554.064314] ? tun_chr_close+0x180/0x180 [ 554.068383] ? selinux_file_open+0x5c0/0x5c0 [ 554.072818] tun_chr_write_iter+0xb9/0x160 [ 554.077063] do_iter_readv_writev+0x8b0/0xa80 [ 554.081562] ? vfs_dedupe_file_range+0x700/0x700 [ 554.086327] ? rw_verify_area+0x118/0x360 [ 554.090480] do_iter_write+0x185/0x5f0 [ 554.094394] ? dup_iter+0x260/0x260 [ 554.098035] ? proc_cwd_link+0x1d0/0x1d0 [ 554.102107] vfs_writev+0x1f1/0x360 [ 554.105766] ? vfs_iter_write+0xb0/0xb0 [ 554.109753] ? wait_for_completion+0x8a0/0x8a0 [ 554.114356] ? __lock_is_held+0xb5/0x140 [ 554.118436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 554.123989] ? __fdget_pos+0xde/0x200 [ 554.127827] ? __fdget_raw+0x20/0x20 [ 554.131545] ? __sb_end_write+0xd9/0x110 [ 554.135620] do_writev+0x11a/0x310 [ 554.139164] ? vfs_writev+0x360/0x360 [ 554.142970] ? trace_hardirqs_off_caller+0x310/0x310 [ 554.148099] __x64_sys_writev+0x75/0xb0 [ 554.152096] do_syscall_64+0x1b9/0x820 [ 554.155985] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 554.161370] ? syscall_return_slowpath+0x5e0/0x5e0 [ 554.166312] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 554.171162] ? trace_hardirqs_on_caller+0x310/0x310 [ 554.176185] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 554.181221] ? prepare_exit_to_usermode+0x291/0x3b0 [ 554.186274] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 554.191137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.196322] RIP: 0033:0x457521 [ 554.199517] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 554.218417] RSP: 002b:00007f2e79b63ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 554.226142] RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 0000000000457521 [ 554.233407] RDX: 0000000000000001 RSI: 00007f2e79b63bf0 RDI: 00000000000000f0 05:30:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8) fstatfs(r0, &(0x7f0000000040)=""/107) setresuid(0x0, 0xee01, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f00000011c0)='./file0\x00', 0x40000, 0x10) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f00000001c0)="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", 0x1000) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000140)) shutdown(r1, 0x1) ptrace(0x10, r3) [ 554.240673] RBP: 00000000200008c0 R08: 00000000000000f0 R09: 0000000000000000 [ 554.247953] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f2e79b646d4 [ 554.255228] R13: 00000000004c53b4 R14: 00000000004d9900 R15: 0000000000000005 05:30:40 executing program 1: perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:40 executing program 0 (fault-call:3 fault-nth:1): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:40 executing program 2 (fault-call:3 fault-nth:3): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:40 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000004, 0x0, 0x0, 0x0, 0x0) [ 554.394197] audit: type=1400 audit(1545197440.641:103): avc: denied { create } for pid=22918 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1 05:30:40 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000006, 0x0, 0x0, 0x0, 0x0) [ 554.538898] FAULT_INJECTION: forcing a failure. [ 554.538898] name failslab, interval 1, probability 0, space 0, times 0 [ 554.550270] CPU: 1 PID: 22932 Comm: syz-executor0 Not tainted 4.20.0-rc7+ #157 [ 554.557728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.567302] Call Trace: [ 554.569933] dump_stack+0x244/0x39d [ 554.573604] ? dump_stack_print_info.cold.1+0x20/0x20 [ 554.578835] ? __lock_acquire+0x62f/0x4c20 [ 554.583097] ? print_usage_bug+0xc0/0xc0 05:30:40 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000007, 0x0, 0x0, 0x0, 0x0) [ 554.587195] should_fail.cold.4+0xa/0x17 [ 554.591278] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 554.596427] ? print_usage_bug+0xc0/0xc0 [ 554.600513] ? zap_class+0x640/0x640 [ 554.604254] ? print_usage_bug+0xc0/0xc0 [ 554.608334] ? lock_downgrade+0x900/0x900 [ 554.612515] ? find_held_lock+0x36/0x1c0 [ 554.616604] ? __nf_conntrack_find_get.part.44+0x10de/0x1cf0 [ 554.622435] ? lock_downgrade+0x900/0x900 [ 554.626602] ? check_preemption_disabled+0x48/0x280 [ 554.631639] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 554.636591] ? kasan_check_read+0x11/0x20 [ 554.640763] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 554.646061] __should_failslab+0x124/0x180 [ 554.650315] should_failslab+0x9/0x14 [ 554.654130] kmem_cache_alloc+0x47/0x730 [ 554.658213] ? __nf_conntrack_find_get.part.44+0x1105/0x1cf0 [ 554.664050] __nf_conntrack_alloc+0x1aa/0x7c0 [ 554.668572] ? early_drop+0xc40/0xc40 [ 554.672444] ? __skb_checksum_complete_head+0x360/0x360 [ 554.677831] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 554.683381] ? icmp_invert_tuple+0x1e7/0x250 05:30:40 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x80000000000c, 0x0, 0x0, 0x0, 0x0) [ 554.688183] ? icmp_packet+0x420/0x420 [ 554.692100] init_conntrack.isra.47+0xff6/0x13c0 [ 554.696880] ? icmp_pkt_to_tuple+0x25d/0x330 [ 554.701366] ? i915_vma_instance+0x10be/0x16c0 [ 554.705961] ? nf_conntrack_alloc+0x50/0x50 [ 554.710313] ? lock_acquire+0x1ed/0x520 [ 554.714313] ? nf_conntrack_in+0x5de/0x13b0 [ 554.718670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 554.724230] ? check_preemption_disabled+0x48/0x280 [ 554.729282] ? kasan_check_read+0x11/0x20 [ 554.733473] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 05:30:41 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x80000000000a, 0x0, 0x0, 0x0, 0x0) [ 554.738765] ? trace_hardirqs_off_caller+0x310/0x310 [ 554.743912] nf_conntrack_in+0xc7d/0x13b0 [ 554.748073] ? __local_bh_enable_ip+0x160/0x260 [ 554.752795] ? nf_conntrack_update+0xbc0/0xbc0 [ 554.757422] ? __do_replace+0xab0/0xab0 [ 554.761411] ? zap_class+0x640/0x640 [ 554.765155] ? lock_acquire+0x1c0/0x520 [ 554.769148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 554.774711] ? ipv6_confirm+0x650/0x650 [ 554.778697] ipv4_conntrack_in+0x1d/0x30 [ 554.782778] nf_hook_slow+0xc2/0x1c0 [ 554.786551] ip_rcv+0x387/0x600 05:30:41 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x0) [ 554.789863] ? ip_local_deliver+0x750/0x750 [ 554.794227] ? pvclock_read_flags+0x160/0x160 [ 554.798766] ? ip_rcv_finish_core.isra.16+0x1f40/0x1f40 [ 554.804150] ? lock_acquire+0x1ed/0x520 [ 554.808160] __netif_receive_skb_one_core+0x14d/0x200 [ 554.813365] ? __netif_receive_skb_core+0x3b30/0x3b30 [ 554.818568] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 554.823862] ? rcu_softirq_qs+0x20/0x20 [ 554.827856] __netif_receive_skb+0x2c/0x1e0 [ 554.832240] netif_receive_skb_internal+0x12c/0x800 [ 554.837273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 554.842861] ? dev_cpu_dead+0xac0/0xac0 [ 554.846853] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 554.852403] ? eth_type_trans+0x2ea/0x760 [ 554.856565] ? eth_gro_receive+0x920/0x920 [ 554.860821] napi_gro_frags+0x75a/0xc90 [ 554.864844] ? napi_gro_receive+0x5f0/0x5f0 [ 554.866183] FAULT_INJECTION: forcing a failure. [ 554.866183] name failslab, interval 1, probability 0, space 0, times 0 [ 554.869177] ? eth_get_headlen+0x173/0x1f0 [ 554.869194] ? eth_type_trans+0x760/0x760 [ 554.869224] ? tun_get_user+0x3160/0x4250 [ 554.869246] tun_get_user+0x3189/0x4250 [ 554.897128] ? lock_downgrade+0x900/0x900 [ 554.901284] ? check_preemption_disabled+0x48/0x280 [ 554.906318] ? tun_net_xmit+0x1c90/0x1c90 [ 554.910468] ? zap_class+0x640/0x640 [ 554.914372] ? avc_has_perm+0x55f/0x7e0 [ 554.918407] ? find_held_lock+0x36/0x1c0 [ 554.922482] ? tun_get+0x206/0x370 [ 554.926037] ? lock_downgrade+0x900/0x900 [ 554.930205] ? check_preemption_disabled+0x48/0x280 [ 554.935227] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 554.940161] ? kasan_check_read+0x11/0x20 [ 554.944311] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 554.949591] ? rcu_softirq_qs+0x20/0x20 [ 554.953582] ? tun_get+0x22d/0x370 [ 554.957127] ? tun_chr_close+0x180/0x180 [ 554.961195] ? selinux_file_open+0x5c0/0x5c0 [ 554.965616] tun_chr_write_iter+0xb9/0x160 [ 554.969857] do_iter_readv_writev+0x8b0/0xa80 [ 554.974374] ? vfs_dedupe_file_range+0x700/0x700 [ 554.979154] ? rw_verify_area+0x118/0x360 [ 554.983326] do_iter_write+0x185/0x5f0 [ 554.987232] ? dup_iter+0x260/0x260 [ 554.990873] ? proc_cwd_link+0x1d0/0x1d0 [ 554.994955] vfs_writev+0x1f1/0x360 [ 554.998589] ? vfs_iter_write+0xb0/0xb0 [ 555.002580] ? wait_for_completion+0x8a0/0x8a0 [ 555.007176] ? __lock_is_held+0xb5/0x140 [ 555.011248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.016792] ? __fdget_pos+0xde/0x200 [ 555.020599] ? __fdget_raw+0x20/0x20 [ 555.024317] ? __sb_end_write+0xd9/0x110 [ 555.028388] do_writev+0x11a/0x310 [ 555.031936] ? vfs_writev+0x360/0x360 [ 555.035744] ? trace_hardirqs_off_caller+0x310/0x310 [ 555.040865] __x64_sys_writev+0x75/0xb0 [ 555.044869] do_syscall_64+0x1b9/0x820 [ 555.048762] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 555.054134] ? syscall_return_slowpath+0x5e0/0x5e0 [ 555.059079] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 555.063929] ? trace_hardirqs_on_caller+0x310/0x310 [ 555.068948] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 555.073963] ? prepare_exit_to_usermode+0x291/0x3b0 [ 555.079026] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 555.083894] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 555.089082] RIP: 0033:0x457521 [ 555.092277] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 555.111179] RSP: 002b:00007f3cc3a98ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 555.118886] RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 0000000000457521 [ 555.126156] RDX: 0000000000000001 RSI: 00007f3cc3a98bf0 RDI: 00000000000000f0 [ 555.133424] RBP: 00000000200008c0 R08: 00000000000000f0 R09: 0000000000000000 [ 555.140694] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f3cc3a996d4 [ 555.147961] R13: 00000000004c53b4 R14: 00000000004d9900 R15: 0000000000000005 [ 555.155264] CPU: 0 PID: 22949 Comm: syz-executor2 Not tainted 4.20.0-rc7+ #157 [ 555.162631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.162642] Call Trace: [ 555.174592] dump_stack+0x244/0x39d [ 555.178235] ? dump_stack_print_info.cold.1+0x20/0x20 [ 555.183450] should_fail.cold.4+0xa/0x17 [ 555.187571] ? zap_class+0x640/0x640 [ 555.191305] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 555.196444] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.202014] ? check_preemption_disabled+0x48/0x280 [ 555.207061] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.212667] ? __lru_cache_add+0x2ff/0x4e0 [ 555.216925] ? __lock_acquire+0x62f/0x4c20 [ 555.221175] ? __lock_is_held+0xb5/0x140 [ 555.225256] ? mark_held_locks+0x130/0x130 [ 555.229506] ? is_bpf_text_address+0xac/0x170 [ 555.234021] ? lock_downgrade+0x900/0x900 [ 555.238175] ? check_preemption_disabled+0x48/0x280 [ 555.243202] __should_failslab+0x124/0x180 [ 555.247442] should_failslab+0x9/0x14 [ 555.251246] kmem_cache_alloc_node+0x56/0x730 [ 555.255757] ? rcu_softirq_qs+0x20/0x20 [ 555.259750] ? unwind_dump+0x190/0x190 [ 555.263648] __alloc_skb+0x119/0x770 [ 555.267382] ? netdev_alloc_frag+0x1f0/0x1f0 [ 555.271809] ? unwind_get_return_address+0x61/0xa0 [ 555.276751] ? __save_stack_trace+0x8d/0xf0 [ 555.281088] ? find_held_lock+0x36/0x1c0 [ 555.285172] ? mark_held_locks+0xc7/0x130 [ 555.289328] alloc_skb_with_frags+0x133/0x7d0 [ 555.293844] ? lockdep_hardirqs_on+0x296/0x5b0 [ 555.298443] ? trace_hardirqs_on+0xbd/0x310 [ 555.302766] ? _raw_spin_unlock_bh+0x30/0x40 [ 555.307178] ? skb_complete_wifi_ack+0x1e0/0x1e0 [ 555.311933] ? do_raw_spin_trylock+0x270/0x270 [ 555.316525] ? rt_add_uncached_list+0x1e1/0x280 [ 555.321215] sock_alloc_send_pskb+0x87a/0xaf0 [ 555.325739] ? ip_mtu_from_fib_result+0x5e0/0x5e0 [ 555.330602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.336140] ? sock_wmalloc+0x1f0/0x1f0 [ 555.340120] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.345674] ? rt_set_nexthop.constprop.55+0x549/0x14b0 [ 555.351063] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 555.355830] ? rt_add_uncached_list+0x280/0x280 [ 555.360509] ? rt_dst_alloc+0x15a/0x540 [ 555.364488] ? rt_dst_alloc+0x1ed/0x540 [ 555.368464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.374006] ? rt_dst_alloc+0x41a/0x540 [ 555.378006] sock_alloc_send_skb+0x32/0x40 [ 555.382259] __ip_append_data.isra.48+0x15b8/0x29b0 [ 555.387315] ? icmp_push_reply+0x540/0x540 [ 555.391567] ? ip_generic_getfrag+0x2e0/0x2e0 [ 555.396065] ? __lock_is_held+0xb5/0x140 [ 555.400137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.405670] ? ipv4_mtu+0x39f/0x590 [ 555.409299] ? rt_acct_proc_show+0x370/0x370 [ 555.413731] ? ip_route_output_key_hash+0x270/0x3b0 [ 555.418769] ? lock_downgrade+0x900/0x900 [ 555.422917] ? check_preemption_disabled+0x48/0x280 [ 555.427942] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 555.433486] ip_append_data.part.49+0xef/0x170 [ 555.438079] ? icmp_push_reply+0x540/0x540 [ 555.442319] ip_append_data+0x6d/0x90 [ 555.446129] ? icmp_push_reply+0x540/0x540 [ 555.450379] icmp_push_reply+0x18e/0x540 [ 555.454466] icmp_reply.constprop.29+0xdeb/0xfc0 [ 555.459224] ? kvm_clock_read+0x18/0x30 [ 555.463214] ? icmpv4_xrlim_allow.isra.19+0x540/0x540 [ 555.468404] ? raw_local_deliver+0x96c/0xc3a [ 555.472846] ? lock_downgrade+0x900/0x900 [ 555.477128] ? memcpy+0x45/0x50 [ 555.480421] icmp_timestamp+0x35e/0x630 [ 555.484398] ? icmp_timestamp+0x35e/0x630 [ 555.488562] ? icmp_echo+0x1f0/0x1f0 [ 555.492293] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.497836] ? check_preemption_disabled+0x48/0x280 [ 555.502869] icmp_rcv+0x8dc/0x1570 [ 555.506422] ip_local_deliver_finish+0x2e9/0xda0 [ 555.511200] ? ip_sublist_rcv_finish+0x3a0/0x3a0 [ 555.515962] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 555.520988] ? nf_hook_slow+0x11e/0x1c0 [ 555.524984] ip_local_deliver+0x1e9/0x750 [ 555.529154] ? ip_call_ra_chain+0x730/0x730 [ 555.533514] ? ip_sublist_rcv_finish+0x3a0/0x3a0 [ 555.538285] ? __lock_is_held+0xb5/0x140 [ 555.542395] ip_rcv_finish+0x1f9/0x300 [ 555.546291] ip_rcv+0xed/0x600 [ 555.549486] ? ip_local_deliver+0x750/0x750 [ 555.553805] ? pvclock_read_flags+0x160/0x160 [ 555.558303] ? ip_rcv_finish_core.isra.16+0x1f40/0x1f40 [ 555.563671] ? lock_acquire+0x1ed/0x520 [ 555.567651] __netif_receive_skb_one_core+0x14d/0x200 [ 555.572842] ? __netif_receive_skb_core+0x3b30/0x3b30 [ 555.578043] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 555.583349] ? rcu_softirq_qs+0x20/0x20 [ 555.587328] __netif_receive_skb+0x2c/0x1e0 [ 555.591651] netif_receive_skb_internal+0x12c/0x800 [ 555.596670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.602226] ? dev_cpu_dead+0xac0/0xac0 [ 555.606225] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 555.611762] ? eth_type_trans+0x2ea/0x760 [ 555.615922] ? eth_gro_receive+0x920/0x920 [ 555.620165] napi_gro_frags+0x75a/0xc90 [ 555.624142] ? napi_gro_receive+0x5f0/0x5f0 [ 555.628478] ? eth_get_headlen+0x173/0x1f0 [ 555.632727] ? eth_type_trans+0x760/0x760 [ 555.636881] ? tun_get_user+0x3160/0x4250 [ 555.641062] tun_get_user+0x3189/0x4250 [ 555.645100] ? lock_downgrade+0x900/0x900 [ 555.649263] ? check_preemption_disabled+0x48/0x280 [ 555.654761] ? tun_net_xmit+0x1c90/0x1c90 [ 555.658909] ? zap_class+0x640/0x640 [ 555.662633] ? avc_has_perm+0x55f/0x7e0 [ 555.666616] ? find_held_lock+0x36/0x1c0 [ 555.670709] ? tun_get+0x206/0x370 [ 555.674277] ? lock_downgrade+0x900/0x900 [ 555.678444] ? check_preemption_disabled+0x48/0x280 [ 555.683465] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 555.688396] ? kasan_check_read+0x11/0x20 [ 555.692557] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 555.697925] ? rcu_softirq_qs+0x20/0x20 [ 555.701909] ? tun_get+0x22d/0x370 [ 555.705446] ? tun_chr_close+0x180/0x180 [ 555.709508] ? selinux_file_open+0x5c0/0x5c0 [ 555.713920] tun_chr_write_iter+0xb9/0x160 [ 555.718190] do_iter_readv_writev+0x8b0/0xa80 [ 555.722690] ? vfs_dedupe_file_range+0x700/0x700 [ 555.727470] ? rw_verify_area+0x118/0x360 [ 555.731625] do_iter_write+0x185/0x5f0 [ 555.735569] ? dup_iter+0x260/0x260 [ 555.739210] ? proc_cwd_link+0x1d0/0x1d0 [ 555.743298] vfs_writev+0x1f1/0x360 [ 555.746943] ? vfs_iter_write+0xb0/0xb0 [ 555.750922] ? wait_for_completion+0x8a0/0x8a0 [ 555.755522] ? __lock_is_held+0xb5/0x140 [ 555.759596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.765137] ? __fdget_pos+0xde/0x200 [ 555.768941] ? __fdget_raw+0x20/0x20 [ 555.772658] ? __sb_end_write+0xd9/0x110 [ 555.776731] do_writev+0x11a/0x310 [ 555.780292] ? vfs_writev+0x360/0x360 [ 555.784093] ? trace_hardirqs_off_caller+0x310/0x310 [ 555.789300] __x64_sys_writev+0x75/0xb0 [ 555.793278] do_syscall_64+0x1b9/0x820 [ 555.797182] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 555.802545] ? syscall_return_slowpath+0x5e0/0x5e0 [ 555.807492] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 555.812335] ? trace_hardirqs_on_caller+0x310/0x310 [ 555.817368] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 555.822387] ? prepare_exit_to_usermode+0x291/0x3b0 [ 555.827423] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 555.832267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 555.837477] RIP: 0033:0x457521 [ 555.840670] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 555.859585] RSP: 002b:00007f2e79b63ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 555.867294] RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 0000000000457521 [ 555.874565] RDX: 0000000000000001 RSI: 00007f2e79b63bf0 RDI: 00000000000000f0 [ 555.881845] RBP: 00000000200008c0 R08: 00000000000000f0 R09: 0000000000000000 05:30:42 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") getuid() pipe2(&(0x7f0000000040), 0x84800) clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x4800, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) 05:30:42 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0xe, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") [ 555.889114] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f2e79b646d4 [ 555.896379] R13: 00000000004c53b4 R14: 00000000004d9900 R15: 0000000000000005 05:30:42 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:42 executing program 0 (fault-call:3 fault-nth:2): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:42 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000003, 0x0, 0x0, 0x0, 0x0) [ 556.135180] FAULT_INJECTION: forcing a failure. [ 556.135180] name failslab, interval 1, probability 0, space 0, times 0 [ 556.146536] CPU: 1 PID: 22971 Comm: syz-executor0 Not tainted 4.20.0-rc7+ #157 [ 556.153910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.163270] Call Trace: [ 556.165880] dump_stack+0x244/0x39d [ 556.169539] ? dump_stack_print_info.cold.1+0x20/0x20 [ 556.174764] ? mark_held_locks+0x130/0x130 [ 556.179041] ? kernel_text_address+0x79/0xf0 [ 556.183490] should_fail.cold.4+0xa/0x17 [ 556.187576] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 556.192704] ? save_stack+0xa9/0xd0 [ 556.196346] ? save_stack+0x43/0xd0 [ 556.199985] ? kasan_kmalloc+0xc7/0xe0 [ 556.203934] ? kasan_slab_alloc+0x12/0x20 [ 556.208097] ? kmem_cache_alloc+0x12e/0x730 [ 556.212463] ? __nf_conntrack_alloc+0x1aa/0x7c0 [ 556.217156] ? init_conntrack.isra.47+0xff6/0x13c0 [ 556.222162] ? nf_conntrack_in+0xc7d/0x13b0 [ 556.226541] ? ipv4_conntrack_in+0x1d/0x30 [ 556.230789] ? nf_hook_slow+0xc2/0x1c0 [ 556.234682] ? ip_rcv+0x387/0x600 [ 556.238140] ? __netif_receive_skb_one_core+0x14d/0x200 [ 556.243542] ? __netif_receive_skb+0x2c/0x1e0 [ 556.248059] ? netif_receive_skb_internal+0x12c/0x800 [ 556.253253] ? napi_gro_frags+0x75a/0xc90 [ 556.257409] ? tun_get_user+0x3189/0x4250 [ 556.261570] ? tun_chr_write_iter+0xb9/0x160 [ 556.266019] ? zap_class+0x640/0x640 [ 556.269742] ? do_writev+0x11a/0x310 [ 556.273466] ? __x64_sys_writev+0x75/0xb0 [ 556.277624] ? do_syscall_64+0x1b9/0x820 [ 556.281690] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.287071] ? zap_class+0x640/0x640 [ 556.290815] ? find_held_lock+0x36/0x1c0 [ 556.294904] __should_failslab+0x124/0x180 [ 556.299162] should_failslab+0x9/0x14 [ 556.303010] __kmalloc_track_caller+0x6c/0x760 [ 556.307606] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 556.312901] ? rcu_softirq_qs+0x20/0x20 [ 556.316890] ? nf_ct_ext_add+0x369/0x7b0 [ 556.320964] __krealloc+0x6f/0xb0 [ 556.324468] nf_ct_ext_add+0x369/0x7b0 [ 556.328375] ? nf_ct_ext_destroy+0x370/0x370 [ 556.332798] ? __skb_checksum_complete_head+0x360/0x360 [ 556.338212] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 556.343772] ? icmp_invert_tuple+0x1e7/0x250 [ 556.348199] ? icmp_packet+0x420/0x420 [ 556.352115] init_conntrack.isra.47+0x730/0x13c0 [ 556.356895] ? icmp_pkt_to_tuple+0x25d/0x330 [ 556.361349] ? nf_conntrack_alloc+0x50/0x50 [ 556.365713] ? lock_acquire+0x1ed/0x520 [ 556.369708] ? nf_conntrack_in+0x5de/0x13b0 [ 556.374040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.379609] ? check_preemption_disabled+0x48/0x280 [ 556.384651] ? kasan_check_read+0x11/0x20 [ 556.388829] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 556.394122] ? trace_hardirqs_off_caller+0x310/0x310 [ 556.399276] nf_conntrack_in+0xc7d/0x13b0 [ 556.403439] ? __local_bh_enable_ip+0x160/0x260 [ 556.408133] ? nf_conntrack_update+0xbc0/0xbc0 [ 556.412738] ? __do_replace+0xab0/0xab0 [ 556.416733] ? zap_class+0x640/0x640 [ 556.420475] ? lock_acquire+0x1c0/0x520 [ 556.424476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.430047] ? ipv6_confirm+0x650/0x650 [ 556.434038] ipv4_conntrack_in+0x1d/0x30 [ 556.438117] nf_hook_slow+0xc2/0x1c0 [ 556.441852] ip_rcv+0x387/0x600 [ 556.445159] ? ip_local_deliver+0x750/0x750 [ 556.449494] ? pvclock_read_flags+0x160/0x160 [ 556.454028] ? ip_rcv_finish_core.isra.16+0x1f40/0x1f40 [ 556.459415] ? lock_acquire+0x1ed/0x520 [ 556.463407] __netif_receive_skb_one_core+0x14d/0x200 [ 556.468626] ? __netif_receive_skb_core+0x3b30/0x3b30 [ 556.473839] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 556.479126] ? rcu_softirq_qs+0x20/0x20 [ 556.483153] __netif_receive_skb+0x2c/0x1e0 [ 556.487491] netif_receive_skb_internal+0x12c/0x800 [ 556.492547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.498120] ? dev_cpu_dead+0xac0/0xac0 [ 556.502116] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 556.507667] ? eth_type_trans+0x2ea/0x760 [ 556.511825] ? eth_gro_receive+0x920/0x920 [ 556.516082] napi_gro_frags+0x75a/0xc90 [ 556.520077] ? napi_gro_receive+0x5f0/0x5f0 [ 556.524412] ? eth_get_headlen+0x173/0x1f0 [ 556.528660] ? eth_type_trans+0x760/0x760 [ 556.532829] ? tun_get_user+0x3160/0x4250 [ 556.537005] tun_get_user+0x3189/0x4250 [ 556.541007] ? lock_downgrade+0x900/0x900 [ 556.545163] ? check_preemption_disabled+0x48/0x280 [ 556.550199] ? tun_net_xmit+0x1c90/0x1c90 [ 556.554351] ? zap_class+0x640/0x640 [ 556.558097] ? avc_has_perm+0x55f/0x7e0 [ 556.562090] ? find_held_lock+0x36/0x1c0 [ 556.566167] ? tun_get+0x206/0x370 [ 556.569717] ? lock_downgrade+0x900/0x900 [ 556.573876] ? check_preemption_disabled+0x48/0x280 [ 556.578909] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 556.583852] ? kasan_check_read+0x11/0x20 [ 556.588031] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 556.593332] ? rcu_softirq_qs+0x20/0x20 [ 556.597357] ? tun_get+0x22d/0x370 [ 556.600914] ? tun_chr_close+0x180/0x180 [ 556.604991] ? selinux_file_open+0x5c0/0x5c0 [ 556.609440] tun_chr_write_iter+0xb9/0x160 [ 556.613707] do_iter_readv_writev+0x8b0/0xa80 [ 556.618218] ? vfs_dedupe_file_range+0x700/0x700 [ 556.623027] ? rw_verify_area+0x118/0x360 [ 556.627200] do_iter_write+0x185/0x5f0 [ 556.631103] ? dup_iter+0x260/0x260 [ 556.634755] ? proc_cwd_link+0x1d0/0x1d0 [ 556.638835] vfs_writev+0x1f1/0x360 [ 556.642486] ? vfs_iter_write+0xb0/0xb0 [ 556.646479] ? wait_for_completion+0x8a0/0x8a0 [ 556.651094] ? __lock_is_held+0xb5/0x140 [ 556.655171] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.660716] ? __fdget_pos+0xde/0x200 [ 556.664554] ? __fdget_raw+0x20/0x20 [ 556.668277] ? __sb_end_write+0xd9/0x110 [ 556.672369] do_writev+0x11a/0x310 [ 556.675925] ? vfs_writev+0x360/0x360 [ 556.679739] ? trace_hardirqs_off_caller+0x310/0x310 05:30:42 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) [ 556.684854] __x64_sys_writev+0x75/0xb0 [ 556.688855] do_syscall_64+0x1b9/0x820 [ 556.692746] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 556.698118] ? syscall_return_slowpath+0x5e0/0x5e0 [ 556.703053] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 556.707915] ? trace_hardirqs_on_caller+0x310/0x310 [ 556.712942] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 556.717991] ? prepare_exit_to_usermode+0x291/0x3b0 [ 556.723043] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 556.727906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.733105] RIP: 0033:0x457521 05:30:43 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0xfffffffffffffdef, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) [ 556.736306] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 556.755216] RSP: 002b:00007f3cc3a98ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 556.762938] RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 0000000000457521 [ 556.770212] RDX: 0000000000000001 RSI: 00007f3cc3a98bf0 RDI: 00000000000000f0 [ 556.777491] RBP: 00000000200008c0 R08: 00000000000000f0 R09: 0000000000000000 05:30:43 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") [ 556.785296] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f3cc3a996d4 [ 556.792574] R13: 00000000004c53b4 R14: 00000000004d9900 R15: 0000000000000005 05:30:43 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) 05:30:43 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x2, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:43 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, 0x0, 0x0) 05:30:43 executing program 0 (fault-call:3 fault-nth:3): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:43 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x2a, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:43 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000009, 0x0, 0x0, 0x0, 0x0) 05:30:43 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x3, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:43 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0xfcffffff00000000, 0x0, 0x0, 0x0) 05:30:43 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x140, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:43 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x9, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:43 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x8000000000000000, 0x0, 0x0, 0x0) 05:30:43 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:44 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") prctl$PR_SET_SECCOMP(0x16, 0x3, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x316f, 0x38, 0x7fff, 0x2}]}) clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0xed, 0x2, &(0x7f0000000100)=[{&(0x7f00000001c0)="e834aaf3c7809371bf4aa9cbfdb1f018863c66d6f21e278c4893a1e03003148d32fa3b82d302942c472857f5db8074349ea630cb8a50eab4ede898a4c8e94e5bc19478a6e177a77466b9013ede37a08156f468e2fe3dd7a5a0db6c3291a70922c447851c59308fe5df20c21acbfec194c49cfabb3c881a8643da83ac46a87540900c453661f51d2d375238bc2863529eb8c7da48718e2ab65d6990357f6c570c9b31be230c9cb6d7e95798e6f754aef61bc67273fc64923d6cb9cfc09a9db45882c8cca0e65f9154a50c0a59a23902574d7667c00d7720afab52365a8562122b7d7a994e1679b400a3cc085e21f658082d", 0xf1}, {&(0x7f0000000080)="d6ed27", 0x3}], 0x8010, &(0x7f00000002c0)='wlan0\xfc') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0xffffffffffffffff, r1) 05:30:44 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0xd, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:44 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x5, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:44 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x64060000, 0x0, 0x0, 0x0) 05:30:44 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:44 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) 05:30:44 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x200008f6, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:44 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0xfcffffff, 0x0, 0x0, 0x0) 05:30:44 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0xd, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x200008f6, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:44 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x7ffff000, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:44 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x6406, 0x0, 0x0, 0x0) 05:30:44 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x7, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:44 executing program 3: lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000300)={0x3, 0x2}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, r0, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0a3a2d023c2262857180103e06170be270") clone(0x2a00000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = getpid() r5 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r5, 0xc0106418, &(0x7f0000000080)={0x9, 0x8, 0x0, 0x8, 0x200000000000006, 0x100}) rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000140)) inotify_init() syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x2, 0x2) write$selinux_user(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a646c6d5f636f6e090020757365725f750006c3b15498e45e4ce0336f99070136cd28112fb87b0620b9eaa72c5878470919c4c279565c7cb4101cb74e4b4c8b02a27b980da985887b6fd3dcd6a050faf2d500a386825472eb35cacdcf9775a852ccc84777319a149e18acaf72fd814111056c9be9d22104dce4a87260061367442cbcaebf47322ba8b554104212b7f02516f08b5cbc2f65540000000000000000000000000000"], 0x31) ptrace(0x10, r4) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000340)='trusted.overlay.redirect\x00', &(0x7f00000003c0)='./file0\x00', 0x8, 0x3) 05:30:44 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:44 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0xfffffdef, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:44 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x664, 0x0, 0x0, 0x0) 05:30:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0xfffffdef, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:44 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0xfdef, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:44 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0xfffffffc, 0x0, 0x0, 0x0) 05:30:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0xfdef, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:44 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x1e, &(0x7f0000000140)) ptrace(0x10, r1) 05:30:44 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xe, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:45 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x6406000000000000, 0x0, 0x0, 0x0) 05:30:45 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0xffffff88, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:45 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x7ffff000, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:45 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:45 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) wait4(r1, &(0x7f0000000000), 0x5, &(0x7f00000001c0)) ptrace(0x10, r1) 05:30:45 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x9, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:45 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x2, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:45 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0xfcffffff) 05:30:45 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0xfffffffffffffdef, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:45 executing program 3: lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r0, 0xee01, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() pwritev(r1, &(0x7f00000018c0)=[{&(0x7f00000001c0)="b87e6aac2b3f09efb81f73b19c543e5c8386ba3083108c39cdc2df6e1209927b5272329e93f452f9ff2658b021bd57dd6eba85448ab3d38e035854c0691053519e0830f9aaf5814ca39ba8a5f63b665cb9171733708fde575591ddfd2cb6fb88dddb7f6f64dc60be3249f50e77d85316c4dfdef7773672c4f7091dafb9150720f41e1960edcb86dca66e20aa0463f962d89f93421a0cbd4677b014ae8aac49224f4829952016b4ebfe7d8be8f23fa28d784b71ae5a027340eb5a0f87be61b2af43fb97746b727ada678cce7fb362a035f4aab126", 0xd4}, {&(0x7f0000000000)="ab19ac618dbf17079f9d6b7fde39477bf8da97e66c0dde337d4c0005bc7ddbf3500f8473ae45f415daf6ac8bc84659430112caf41ddf34eb4a4137842d5e7fd8ee4e05ffa721355b409350afcb603c8b925a86ac869a6a82d9846c37f417e951cfae0f430fff6c0ae2e010351e5234395c09732c30970a614d437309d4802c4af437d96675758eb00fae85e05eaaa22af2f56e3d8d6f2a373c9ae2481b5937fd659b16f2676f7eebbb5af19c8db6be699d6cac5d2df2", 0xb6}, {&(0x7f00000002c0)="450a0fa5bca9faeb3022af5e0f83b60233d3bcc0ac55a096dde4dc8640a7249372086b8bfa26289cf3c9488165a9b5e57fcb4673b70a08c548133ef6b83f82bbc1f372db0b342cb502e373d58e727674d489b18d5ee8a700277d8c23b8490b95f60106f00228175e4c6ae04b827feddb85d8a2558dadba2fecd9bd18ea21f453fe95eae2bc50c7b09724a5a37bca399a298a26e29ce4821bf571489b4117197e85a9208976300455ad0038f5c610cdad96cfda2a03d45d84c5997b22d6b99a653f33773eb5b447df8c19cbab63c0de19cbae203414891b0313ab8a02c9b3eb339668b5646f37dcf7b5d4dc4f9601a58aafcc80db0fab31fd", 0xf8}, {&(0x7f00000003c0)="1325c75c5975e03527418a4c6cf6c16dc73e451d6b017604b99b3ef59e87d9c8a69976df6f194a072d4f8aacf627bae2093c3b30026ff178d0675ae45ae5e9d8c059b8bf79c55ec2bda92ace00ce65c3f70bc05f76d9db5360a69110d224238e783888d44e1467cbcc991c2e1eb03b2c16cf026b5bdd1f962707b61315dcd852d38a250c6626f687fc5801eda68afc607b799cd1384f960a5655362b2f3c66a359051c002e45dab1c1c8528f9bc856fe07b348b7b6e905875ad1f228deed946d46d3fa8e19ae9c", 0xc7}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="6d80e293dd76bfbdbf6fe9ede7f41a64eb71ad0e18c1418b0ec8f10fed3a6ba8786839639ad963b96194d6a86ea6b8a138b724ec98e7caafde5cdefe575e0075103d8fa6b6dc6db653177f0b27d5f8649d9465e5516d8e04b82bb6c2eb90def77cc1d803", 0x64}, {&(0x7f0000001540)="3cdc1d127d9f5563d97c848c9b28b778a148f171e5cd71f36a4e88bcd4027a8b6baa843e6211556acc7542d488073843649d26d14421cdab6bc9b4cfc754026abe6e2ec3aabf89ee33e1f73b094c557795baf25ca33b198e041569f45bb769eeea85ab33fd9230149eb99fc41bca9a0eff46b9a11a295c167015dc58de650420a2c213a346809c3ff34eb98125605779f84fdd0d7ec955f5745653ff0895774907a80aa0f953eb51cf39f8624d1e8b6b3cf254c0f4273a2686707885b59e6a4a8804d14555a8c3880eeb9c710231a012ec96ab2a8f75d128edf55b61a048d62d09a93a76f1e1d9a04c3499d86b0df21e2894c385605355d183", 0xf9}, {&(0x7f0000001640)="2c4e7868f49ad969298d43dd0646c09575f098c15cd1700a036f52ecbce2213d9382c89a826c26d991aa302515d1fba1876629f36f106cff3aec3a11533e8080bfd65679531babf4195ea8bb02202fc23b95d833058e3f525b8a676dbd563b09619999503c17a41c97fb1d2de7691610dea7d1d488d5fda21887ad476b3bb91f313fa7de65e1769fafdcae9f9405426e618232eec28101ab4404373dca0a453ffd3f87c3cdd99b39bc3dc1127bbed759648ef71e2eace85b3e31f4b9b17bec6ce7cb1cbc12c3edc604d92724f2f550abe48f6f63fee35bbbf43c187ef6a69a", 0xdf}, {&(0x7f0000001740)="86897902f9206be53c43d01569ee09621116d6473285dcdfff3e0dcc162cb5e1ccafdd977eb16c556dbabdf4720ff7ed8f0477bc8ce85764f8eb556f7f24304e535122f1a81879a928f42573070ed57b4c7779de4b2430f0aaa5355260a15763d4df468690772710e59fafe7a465d12d655b327ed16edfaa3d9f37c3f93307978e140f23a0bcf2b0ed40ea41e2d73218113a982e8989ea08ef887c7026ea1358333d7e0d135fb46ef279bcae0f42", 0xae}, {&(0x7f0000001800)="0b7c8bb3bac17d871a6949d50ac263edf15cf145ab6bcdf36a1ec1464f8b53b71d7ebf363e75d6cbc527e5b23311ce7ce2a3dae0e6ee6f469273513f083781da1b02cc6407ef60f09739cf4d2f11e8af12251287a13b917c0ccdb027c05768287ed8560f78e9c1dab0992314718381ac19bfe1e72cd9c731cf77052f644b414d09a232", 0x83}], 0xa, 0x0) rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) ptrace(0x10, r2) 05:30:45 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x2c, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:45 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x2a, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:45 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x3, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:45 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x6406) 05:30:45 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = gettid() fcntl$lock(r0, 0x5, &(0x7f0000000000)={0x0, 0x1, 0x8000, 0x2, r1}) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000001c0)={@remote, 0x0}, &(0x7f0000000200)=0x14) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in=@empty, 0x4e21, 0x9, 0x4e23, 0xfffffffffffffc00, 0xa, 0x0, 0xa0, 0x3f, r3, r4}, {0x0, 0x9, 0x9, 0x3, 0x1, 0xee30}, {0x8, 0x0, 0x7, 0x1}, 0x1000000000000000, 0x6e6bb7, 0x1, 0x1, 0x2, 0x76387dc5ffe73d26}, {{@in=@multicast2, 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x0, 0x3, 0x3, 0x8, 0xffff, 0x6, 0x6}}, 0xe8) clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f0000000140)) ptrace(0x10, r5) 05:30:45 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:45 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0xf000, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:45 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x664) 05:30:45 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x140, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:45 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x6, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:45 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() ioctl$int_out(r0, 0x5462, &(0x7f0000000000)) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x2003, 0x0) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000080)={0x6, 0x0, 0x5, 0x3ff, 0x20, 0x5}) ptrace(0x10, r1) 05:30:45 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0xffffff89, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:45 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x11, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:45 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:45 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0xfffffffc) 05:30:46 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0xffffff84, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:46 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x6, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:46 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:46 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x6406000000000000) 05:30:46 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x2f, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:46 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x3a, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:46 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x10, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:47 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0xfcffffff00000000) 05:30:47 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:47 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x9, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:47 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0xffffff89, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:47 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xa, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:47 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)={0x0, 0x401}) ptrace(0x10, r1) getpgid(r1) 05:30:47 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x8000000000000000) 05:30:47 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(0x0, &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:47 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xb, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:47 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x64060000) [ 561.194656] IPVS: ftp: loaded support on port[0] = 21 05:30:47 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) futex(&(0x7f0000000080)=0xfffffffffffffffc, 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:47 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x1000000, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:47 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(0x0, &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:47 executing program 5: openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) accept$alg(r0, 0x0, 0x0) mmap(&(0x7f00008f2000/0x4000)=nil, 0x4000, 0x200000f, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x440, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000040)) [ 561.579536] audit: type=1400 audit(1545197447.831:104): avc: denied { map } for pid=23328 comm="syz-executor5" path="/dev/audio" dev="devtmpfs" ino=16064 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 [ 561.615702] QAT: Invalid ioctl [ 561.637397] QAT: Invalid ioctl 05:30:48 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x2, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:48 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x6, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:48 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") [ 563.486411] bridge0: port 1(bridge_slave_0) entered blocking state [ 563.492849] bridge0: port 1(bridge_slave_0) entered disabled state [ 563.500005] device bridge_slave_0 entered promiscuous mode [ 563.506880] device bridge_slave_1 left promiscuous mode [ 563.512395] bridge0: port 2(bridge_slave_1) entered disabled state [ 563.521608] device bridge_slave_0 left promiscuous mode [ 563.527751] bridge0: port 1(bridge_slave_0) entered disabled state [ 565.564050] team0 (unregistering): Port device team_slave_1 removed [ 565.574067] team0 (unregistering): Port device team_slave_0 removed [ 565.586694] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 565.601529] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 565.645380] bond0 (unregistering): Released all slaves [ 565.681493] bridge0: port 2(bridge_slave_1) entered blocking state [ 565.688555] bridge0: port 2(bridge_slave_1) entered disabled state [ 565.696092] device bridge_slave_1 entered promiscuous mode [ 565.771798] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 565.824276] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 565.959499] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 566.007805] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 566.224578] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 566.232107] team0: Port device team_slave_0 added [ 566.277222] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 566.284601] team0: Port device team_slave_1 added [ 566.329959] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 566.377038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 566.424844] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 566.432077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 566.448580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 566.488966] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 566.496669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 566.504594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 566.973950] bridge0: port 2(bridge_slave_1) entered blocking state [ 566.980392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 566.987104] bridge0: port 1(bridge_slave_0) entered blocking state [ 566.993470] bridge0: port 1(bridge_slave_0) entered forwarding state [ 567.001814] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 567.766056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 568.004828] 8021q: adding VLAN 0 to HW filter on device bond0 [ 568.094139] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 568.183891] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 568.190213] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 568.197747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 568.284646] 8021q: adding VLAN 0 to HW filter on device team0 05:30:55 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) setresuid(0x0, 0xee01, r0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x100) getsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) ptrace(0x10, r2) 05:30:55 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x79, 0x0, 0x4, "8a36342ea91ed57159c09b9ad70647a0", "b4644bda8b58c66a54f163e0c81bea48c512184645434dec0c506424a89de47fc9c3ebdee6e5eef9a3752d1c56907ac84bd4c22a21f591de09061d4a9d3d7acc42ef023da6a2a70103c4a87dc5ce856af356e56ad44485f8e9cdce2899095dccfdd63441"}, 0x79, 0x2) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:55 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xf, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:55 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x4, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:55 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x12, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:55 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:55 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 05:30:56 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x3, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:56 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x7, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:56 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x4, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:56 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000d53000/0x2000)=nil, 0x2000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.swap.current\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000200)) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xc0000, 0x8) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f0000000080)={0x9, 0xc122, 0x0, 0x8f7a, [], [], [], 0xfffffffffffff1ab, 0x0, 0x9, 0xffff, "e9c826368d9295e50d3ffee7c355c5bc"}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000040)={0xff, 0x18, [0x200, 0x0, 0x80, 0x5, 0x0, 0x3529]}) 05:30:56 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x301, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:56 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f000044e000/0x3000)=nil, 0x3000, 0x1000000, 0x14, r0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x5, 0x1, 0x2, 0x1, 0x20, 0x9}, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r3, 0xd00, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x15}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) 05:30:56 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0xffffff1f, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:56 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0xa, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:56 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/ip_tables_matches\x00') ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f00000001c0)={0x0, @reserved}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) 05:30:56 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:56 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:56 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x2b, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:56 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x12, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:56 executing program 3: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xdd) setresuid(r0, r2, r1) r3 = socket$l2tp(0x18, 0x1, 0x1) gettid() ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = getpid() fcntl$setflags(r3, 0x2, 0x1) rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000140)) ptrace(0x10, r4) 05:30:57 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x5) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x8, 0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{0x20, '/dev/nullb0\x00'}, {}, {0x20, '/dev/nullb0\x00'}], 0xa, "dcb9efe1b585b01b51"}, 0x2f) 05:30:57 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xd, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:57 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfd, 0x1) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040), &(0x7f00000000c0)=0x4) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)=0x18039b3200000000, 0x4) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:57 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x21, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:57 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x3a, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:57 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x8, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:57 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x82028401}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="90000000", @ANYRES16=r2, @ANYBLOB="000425fd00120a000004000200600007000c000400080000000000000008000100050000000c0003000000000000000000080001000900000008000100080008000c0003a0cf5c0009000000000000000c000300e2c45b8bd44410640400000000001a83c2000008000200010000000c"], 0x90}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:57 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x29, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:57 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x8, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:57 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:57 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhci\x00', 0x2040, 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x18) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={r3, 0x6}, 0x8) syz_emit_ethernet(0x3a, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @local, {[@lsrr={0x83, 0xb, 0x5ef, [@remote={0xac, 0x223}, @multicast1]}, @ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, 0x0) r4 = memfd_create(&(0x7f00000000c0)='/dev/nullb0\x00', 0x1) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r1, &(0x7f00000004c0)={0x78, 0xffffffffffffffda, 0x8, {0xfffffffffffffffa, 0xffff, 0x0, {0x1, 0x4, 0xfffffffffffffe00, 0x20, 0x3ff, 0x401, 0x100, 0x9, 0xffffffffffffff00, 0x6, 0x20, r5, r6, 0x5, 0x8}}}, 0x78) ioctl$KDMKTONE(r4, 0x4b30, 0x3) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) r7 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r7, 0x0, 0x63, &(0x7f0000000040)={'NETMAP\x00\x00\x00\xab|\x81\xe3Z8\x8c\xbe\x00'}, &(0x7f0000000080)=0x1e) 05:30:57 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0xffffff88, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:57 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x200001c2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:57 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x800041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000080)={{r2, r3/1000+30000}, 0x0, 0x7, 0x1f}, 0x18) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000140)) ptrace(0xffffffffffffffff, r4) 05:30:57 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x3c, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:57 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x200000e, 0x11, r0, 0x400000000) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:58 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x4, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:58 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x5, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:58 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:58 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f0000000000)=0xfffffffffffffffd, 0x800000000008, 0x0, 0x0, 0x0, 0xffffffffffffffff) 05:30:58 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0411120, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:58 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x21, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:58 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000008, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 05:30:58 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x3, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:58 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0510c20, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:58 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x4, 0x248200) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000080)={0x3ffc00000000, 0x1, 0x1}) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:58 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x29, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:58 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x200000041f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000400)={0x6, 0x0, [{0x2000, 0xf9, &(0x7f00000001c0)=""/249}, {0x1f001, 0x2, &(0x7f0000000040)=""/2}, {0xf000, 0xc, &(0x7f0000000080)=""/12}, {0x0, 0xa6, &(0x7f00000002c0)=""/166}, {0x0, 0x16, &(0x7f0000000100)=""/22}, {0x0, 0x7d, &(0x7f0000000380)=""/125}]}) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000500), &(0x7f0000000540)=0x18) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) ptrace(0x10, r2) 05:30:58 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:58 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x11, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:58 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x178472000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:58 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x5, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:58 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x2f, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:58 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x2008d1c0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:58 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000040)={0x20, 0x0, 0xdbb, 0x80, 0x2, 0x6c000000000000}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x84000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:59 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, 0x0, 0x0) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:59 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x102, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000040)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:59 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x2b, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:59 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0xffffff1f, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:59 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0xa) setresuid(0x0, 0xee01, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) ptrace(0x10, r2) 05:30:59 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:59 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xd0a06401000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:59 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x34000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:59 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x2c, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:59 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, 0x0, 0x0) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:30:59 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x2000000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:59 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) rt_sigqueueinfo(r0, 0x16, &(0x7f0000000040)={0xb, 0xfffffffffffffa20}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) futex(&(0x7f00000000c0)=0x2, 0x1, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)=0x2, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:30:59 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xb0fec001000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:30:59 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0xf000, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:30:59 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x88a8ffff00000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:00 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) socketpair(0x10, 0x0, 0x64e, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000180)=0x8, 0x4) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x200, 0x400) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1a, &(0x7f00000000c0)="a30529d563bf5ca56306feb83c3289bdd3af577d4e8ac91c9511f6da2237bb1613d2642b4f29e11510e88103ecdb7be23ae9f2c4714dc545be9b9d23bc583f9a9d73380518eb94b9c0c64e6053e39e8192b1be", 0x53) r3 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000001c0)) 05:31:00 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f00000001c0)={[], 0xff, 0x0, 0x7, 0x0, 0x800, 0x4, 0x4, [], 0x100000001}) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x4207, r1) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000080)=0x9) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000040)={0x0, @aes256, 0x3, "f08a3a988c2e6534"}) 05:31:00 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x3c, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:00 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:00 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, 0x0, 0x0) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:31:00 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xe01fa601000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:31:00 executing program 5: prctl$PR_SET_FP_MODE(0x2d, 0x1) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) write$UHID_SET_REPORT_REPLY(r1, &(0x7f00000000c0)={0xe, 0x3, 0x7, 0xfff, 0xdb, "82c18f46d7d1accbddad6e27b4c08fcb8c2d80e83603f0c89aa9fa0701d9ce8b00cb970ca291595ccb304c20f4cccf55f5bb6ce16afb4581ebc3f84633407e850537c826f30022c883e4cfc286be6fbc1e4a44d74fd46b3801cde92a2696dd8369c5f7cbbdb906d92994a99352eaff54a133fbcc9c8d03f376ae2787b8558f55394461e92a81d86c5b9102e59f8a6f5a75e679f1180016bba621d2122f1d028acb59f384d0417c3675869befdba9bc6bd21e3b703d9074b7c4d0f96a6dcd4ec0be10189c6cfa93a11bc0a2ab6c91932d397fc319ef443a2efa2492"}, 0xe7) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40000, 0x0) connect$llc(r2, &(0x7f0000000040)={0x1a, 0x310, 0x7, 0x3, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) 05:31:00 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0xffffff84, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:00 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) getsockopt$inet6_mreq(r1, 0x29, 0x3ecf0c64eaa57159, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) sendmsg$nl_crypto(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)=@upd={0xf0, 0x12, 0x804, 0x70bd2c, 0x25dfdbfb, {{'ctr-serpent-avx\x00'}, [], [], 0x2400, 0x2000}, [{0x8, 0x1, 0x9}, {0x8, 0x1, 0x8000}]}, 0xffffffffffffff92}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x7fff, 0x40000) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000500)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'team0\x00'}}) sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x10c, r2, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9b7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0xd0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf281}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffc1}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4a1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffe}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x20000000}, 0xc044) 05:31:00 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8060000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:00 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0b10a20, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:31:00 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000011, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f00000001c0)={0x1000, 0x6000, 0x6, 0x6, 0x5}) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000000)={0x0, 0x2, 0x0, [{0x0, 0x3a8, 0x10000, 0x8, 0x2, 0x1, 0x10000}, {0x7, 0x79e4, 0x406, 0x3, 0x6, 0x7, 0x2}]}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f000033c000/0x3000)=nil, 0x3000}, 0x1}) open_by_handle_at(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="f000000000000000bbc1d8230f62b464ff8710ce2ae0388a24eb6cfb0cab0d3cf35a3b27b678869ee1bfcc855991caed88aaf02a3ffb18953efe890dc03c4ba1a2d6bc3e1e2d43552fb7ae3eb3ba44b925f64f9af68a86f04ab42380bee1a2076df104a549de46be5be670faa249891a45328d0c30dbc9f0a2d65babde754aed0fe446f3f4e7111c365fbbbe0bfa4c0601d07a45fb9a0b34f34ba20a077e593f630ff3f6c66d130839747eee05c2fdacc047e2a1fe010cd957b58a7c6f064957160d081a347ea6854ec9fb452b87e4b4e82c95cc16a2320f41dd547bb7e862a56c6a617e9d5c8541e2"], 0x40) 05:31:00 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x8, 0x80, 0xc2, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:01 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x1, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ptrace(0x10, r1) 05:31:01 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x43050000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:01 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0b10b20, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:31:01 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xd}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:01 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x8d, 0x0, 0x0, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) write$P9_RCREATE(r1, &(0x7f0000000080)={0x18, 0x73, 0x2, {{0x20, 0x3}, 0x400000000000000a}}, 0x18) 05:31:01 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") [ 575.184832] QAT: Invalid ioctl 05:31:01 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xffffdd86}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:01 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x689}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:01 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x1) ioctl$TIOCNXCL(r1, 0x540d) 05:31:01 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1c3b1f000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:31:01 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:31:01 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x5000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:02 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x55ae) 05:31:02 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xffffdd86}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:02 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1cd415000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:31:02 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x800e0000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:02 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) socket$tipc(0x1e, 0x2, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x240, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000040)={"3a226e2e84b530159e951c6abcfeeed73560705af3ebab21380035988f3ab8db1748c25b3f0bc83c0087d27accf391a2b40d1ee11ba37e9f6c359e180f226e468aee5f72973e0e514934409ef1388bee9495ade7bb5ede6030f92c937b3ceafbf46ce6d90b822089230a9451da0620333eacb01ec6d6ced561e2851a0839ec94363a4f9ed5a5500163b1a1013ae70a24ad158b42dee5e00b636a4a28a901338c7b4f9de8b7e956ab1adeae6ad6bc47f4130ce1beae6c38c33c39162e6efa26dfec25a049f00ddf20c3d73b4f34eee7975f6c4ed6a62c17d8c2c48226524a8324a8bcf1eddecb1ce4622b6a4be73368a408becbb991fa9eaf3ec933a5f19f2fb3fc58091bcdfb7fc812428bcff60687b3bcc16f9b9fb57a36e6476d6db5fd9bad4cbe690079f9905bf9b73d304b9a3404e118183ca13aa5d470f4d27485d471ebe2181c11d8e11192a8a5a91d0615e46cf24a354214953f1b2ba0e9cb1a613ed545aaa2b601f0dd84e57ec228d8a6c3ceafdd987ba62224539965e8e8cc92ef82d9ab16129c6333541743e69c201e98fd37cc0c7bbb6af6179c2b0ed4d8027275bb42ee7bd9630ffdac9869c4fbf1ddf4f9279eacddd20fa6bab0f7dc67fb993f40314ba7bf59eee2bd3356e41ff68553f197a10a723cf80a23e35256d5ff09333519a0428b7294698cac6efa4c1e888620ee9c1e056bb9b73e9d4b7855288b30cca076e8565ead51d622830a4b13aab24cd8571154a3e00f46079009bcea1c6ae74d350ea6479c75c869c35c45fb300db029b8ef296a73aaa80f3eb6da11f2a28de00f1ab4b0729c052ec438a90bf6c15dc93d51a435ef5b7d5610648888981e8e6179baf844aadeb0470aa5c909387436b50595a2ad1216851b1751629081da167138d7876e5e25da6be0b5dc5d35a390f78c32b51b039f89b55cf5be8f6423eb973fa3b9cabc3f4cddca000c64f0060a6929aadab7c33ff6d92be401e5ecd261df01a92ffd5b32b14e01d2e3882fd8ebf04f117e8e2f4fc5424d5e1d0b8bbc8d403677afc33e5cbbc4e48c3ddf23b748c05c7e286c7ef8d4d6d517fc80aa04d6bdd753085b16d395ec0721359d1c9e3cad5f24558e21ea8bed50f20572f296d8ec21471f33c4a4e68256c4f7a4827cd73524dc3bbe1f5f394a9015a6c920d9c9a11696bb454ed6d6135a25e942b6fa615999a0155360b06638d4b6d7d8bff31966e40a4c23fe019e0925066b103c54e0fdfc196f737b91251eb5c0a365b684329fb57e8e32080bcdc34b63ec969563f32faeda122c43cf19addf65894d4917bbac096514c7adab4533d3630ba2fb576e21da5339f9e5e7e036a8e5614b3935b0ad1f2b9bb73ca9beb902038bc4b39baff95ba7cc5450f5989937ce65d20b08830203ec75b1e24693abdf6e7db608c3899abcf1e1a5dbda88ca99bd8eaf55df"}) 05:31:02 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:31:02 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000939000/0x1000)=nil, 0x1000, 0x200000e, 0x2000001b, r0, 0x4) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:31:02 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x1100}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:02 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xfffffffe}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:02 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x201631c0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:31:02 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xfeffffff00000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:02 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xe00000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:03 executing program 3: setresuid(0x0, 0xee01, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008915, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) ptrace(0x10, r2) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f00000001c0), 0x4) ioctl$VHOST_GET_VRING_ENDIAN(r3, 0x4008af14, &(0x7f0000000080)={0x3}) signalfd4(r1, &(0x7f0000000000)={0x5}, 0x8, 0x80800) 05:31:03 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xb0c2bf01000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:31:03 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x101000) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r2}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:31:03 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8864}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:03 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:31:03 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x20000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:03 executing program 5: prctl$PR_SVE_GET_VL(0x33, 0x189c1) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000a2d000/0x3000)=nil, 0x3000, 0x200000a, 0x13, r0, 0x0) futex(&(0x7f0000000000), 0x800000000008, 0x4, 0x0, 0x0, 0x0) 05:31:03 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xf0ffff}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:03 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x28}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:03 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000040)=0x3ff) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x9, 0x6010, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:31:03 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xb00}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:03 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xffffca88}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:03 executing program 3: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x80, 0x0) sendto$unix(r0, &(0x7f0000000300)="94e42a573fcb8fff122e23a16d18ca420d6ecbe66ef5946624a88b1a7114e99880b809a92767", 0x26, 0x400c000, 0x0, 0x0) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x80000, 0x4) setresuid(0x0, 0xee01, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x38, &(0x7f0000000000)={0x0, 0x0, 0x100000000000}) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x2) write$binfmt_script(r1, &(0x7f0000000180)={'#! ', './file0', [{0x20, '@md5sum\'md5sum'}, {0x20, 'trusted.overlay.redirect\x00'}, {}, {0x20, 'posix_acl_access\\/md5summd5sum$'}, {0x20, 'trusted.overlay.redirect\x00'}], 0xa, "06cb37d30853f6ca593a3447271f8df8da80d3400219b5f93083ef03aa6e44b71953972382da62aefb5da1db342a6c2a3113a190201fe317ec2ebf902f8cbe2d28a08d924e00979e455f69c69550babfbd46edc4e226778cb28f8c"}, 0xca) ptrace(0x10, r2) 05:31:03 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc035c201000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:31:03 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x0, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:31:03 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xd00000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:03 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 05:31:03 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8100000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:03 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x70, 0x101400) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000040)={{0x0, @addr=0x4}, 0x8, 0x8}) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) ptrace(0x10, r2) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x7fff, 0xfff, 0x1f}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e20}}, 0x100000000, 0x8, 0x68da, 0x6, 0x8000}, &(0x7f0000000280)=0x98) fcntl$getown(r0, 0x9) 05:31:04 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x20aa6401000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:31:04 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x6b6b6b}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:04 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x2000000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:04 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x400300}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:04 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x0, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:31:04 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x17ae68000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:31:04 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x7000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:04 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x81000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:04 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x43050000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) [ 597.863899] syz-executor5 (24158) used greatest stack depth: 7440 bytes left 05:31:24 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x4000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:24 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1ccaa3000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:31:24 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x155040, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x13, r0, 0xfffffffffffffffd) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x2000000000) 05:31:24 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x3580}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:24 executing program 3: inotify_init1(0x80000) setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x4, &(0x7f0000000280)=[{&(0x7f0000000080)="da930f6b4b8b7722497f", 0xa, 0x90}, {&(0x7f0000000100)="3dea40077f6329e349ed341bcab014b4dc32e8d7b246e99f349dc9a0e7b32db789", 0x21, 0x2}, {&(0x7f00000001c0)="de70698e24e00bc34dde3191ffb536f556c9129d328aee85abaa78f5af0f82a05090882472e6af52aa2790ae565d4accf128a167511036ab470378b1884adda3ef", 0x41, 0x1}, {&(0x7f0000000240)="7f799bb6aa3ff91ae54523185ca986", 0xf, 0xf754}], 0x8000, 0x0) clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) 05:31:24 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x0, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:31:24 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:31:24 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x88a8ffff00000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:24 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x3}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:24 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xffffffff00000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:24 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x100000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:24 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x4059b501000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:31:25 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8906000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:25 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xfdffffff00000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:25 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0x0, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:31:25 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xe0107f01000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:31:25 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000000)=0x6) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0x32, "b6dfd3440cbfa605dae77732839d613e2d13967e1e4d6e233be57f05c096e01bd76f9899ba6f3d3945fdd1ce096531666d86"}, &(0x7f0000000200)=0x3a) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000240)={r3, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}}, 0x3f4, 0x1, 0x1ff, 0x6, 0x1}, &(0x7f0000000300)=0x98) sched_setscheduler(r1, 0x0, &(0x7f0000000080)=0x18) sched_rr_get_interval(r1, &(0x7f00000001c0)) 05:31:25 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xf0ffffffffffff}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:44 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x4000000003ffe, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:31:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x2800}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:44 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x3f00}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:44 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x80) getgid() connect$l2tp(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e24, @remote}, 0x1, 0x4, 0x2, 0x1}}, 0x2e) setresuid(0x0, 0xee01, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000140)) ptrace(0x10, r3) 05:31:44 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0x0, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:31:44 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0d1092000000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:31:44 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:31:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x2}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:44 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x2000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x100000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:44 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x200041c0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:31:44 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0x0, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:31:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x86ddffff00000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:44 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8848}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:45 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x6b6b6b}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:31:45 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x200c91c0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:31:45 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x240e01fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) 05:31:45 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:04 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x60}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:04 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x1000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:04 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) ptrace(0x10, r1) 05:32:04 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) pipe2(&(0x7f0000000000), 0x80000) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:32:04 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x181268000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:32:04 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x0, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:32:04 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x15b, 0x200) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xb, r2, &(0x7f00000001c0)=""/194, 0xc2) ptrace(0x10, r1) fremovexattr(r0, &(0x7f0000000000)=@random={'user.', 'bdev!\\\x00'}) 05:32:04 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xfffffffe}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:05 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x40000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:05 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x209f7d01000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:32:05 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xf401}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:05 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x6}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:05 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x305bcd01000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") [ 639.936577] device bridge_slave_1 left promiscuous mode [ 639.942129] bridge0: port 2(bridge_slave_1) entered disabled state [ 639.956502] device bridge_slave_0 left promiscuous mode [ 639.961998] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.057841] team0 (unregistering): Port device team_slave_1 removed [ 640.077246] team0 (unregistering): Port device team_slave_0 removed [ 640.095704] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 640.119473] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 640.160881] bond0 (unregistering): Released all slaves 05:32:21 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8864}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:21 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x4000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:21 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000040)={0x3ff}) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) ptrace(0x10, r2) 05:32:21 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x0, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:32:21 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x60567d01000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:32:21 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$FUSE_INIT(r1, &(0x7f00000000c0)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x8, 0x20, 0xfffffffffffffd5a, 0x1, 0x3, 0x3}}, 0x50) r2 = open(&(0x7f0000000080)='./file0\x00', 0x81, 0x3d) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000040)=0x10000) 05:32:22 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x800e}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:22 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x608}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:22 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xd0ba7f01000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:32:22 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8035}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:22 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x4}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:22 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x10c38001000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") [ 655.982487] IPVS: ftp: loaded support on port[0] = 21 05:32:22 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x6b6b6b00000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:22 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x0, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") [ 657.213578] bridge0: port 1(bridge_slave_0) entered blocking state [ 657.220086] bridge0: port 1(bridge_slave_0) entered disabled state [ 657.227418] device bridge_slave_0 entered promiscuous mode [ 657.273231] bridge0: port 2(bridge_slave_1) entered blocking state [ 657.280145] bridge0: port 2(bridge_slave_1) entered disabled state [ 657.287760] device bridge_slave_1 entered promiscuous mode [ 657.332891] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 657.377698] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 657.516607] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 657.565397] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 657.781848] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 657.789926] team0: Port device team_slave_0 added [ 657.834318] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 657.842249] team0: Port device team_slave_1 added [ 657.886386] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 657.933839] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 657.982886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 658.029593] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 658.037059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 658.052901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 658.564125] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.570587] bridge0: port 2(bridge_slave_1) entered forwarding state [ 658.577283] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.583652] bridge0: port 1(bridge_slave_0) entered forwarding state [ 658.591935] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 658.985970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 660.851997] 8021q: adding VLAN 0 to HW filter on device bond0 [ 661.072975] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 661.291176] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 661.297444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 661.314637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 661.526595] 8021q: adding VLAN 0 to HW filter on device team0 05:32:31 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x0, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:32:31 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0d11020, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:32:31 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xb00}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:45 executing program 3: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) setresuid(r0, 0xee01, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) ptrace(0x10, r2) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x301201, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000480)="ddcf9dc9c3fe320da1b421bfe97c102f60d7482d89b713cd3a41310996303db0cb56b1d967ace89421d44f9de75344402bcdce9bc42754bde8878c1ddf522a5ee1ea", 0x42) openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x80, 0x0) 05:32:45 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xb00000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:45 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x608}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:45 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x80c87b01000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:32:45 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x0, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:32:45 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c0002001000f300000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c000100697036746e6c00000c0002000800090051000000"], 0x3c}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x24) 05:32:45 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x3000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:45 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0311620, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:32:45 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x6b6b6b00}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:45 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x400000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:45 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x11000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:45 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x2013e1c0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:32:46 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") getpid() clone(0x200000000041f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) ptrace$peekuser(0x3, r1, 0x40d) 05:32:46 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xf0ffffffffffff}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:46 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x7}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:32:46 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1793d0000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:32:46 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x0, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") [ 699.731524] syz-executor5 (24752) used greatest stack depth: 6528 bytes left 05:33:06 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_create(0x400) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) 05:33:06 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x88caffff}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:06 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x80040200}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:06 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc091bf01000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:33:06 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x0, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:33:06 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x806000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:06 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x400, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f00000001c0)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000b6a000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x6) futex(&(0x7f000000cffc)=0xffffffffffffffff, 0x800000000008, 0x0, 0x0, 0x0, 0xffffffffffffffff) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000040)={0x9, {{0xa, 0x4e23, 0x81, @mcast2, 0x2}}, {{0xa, 0x4e21, 0x7, @empty, 0x100000001}}}, 0x108) socketpair(0x8, 0x1, 0x1, &(0x7f0000000200)) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 05:33:06 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x14}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:06 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8848}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:06 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xffffa888}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:06 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x6488}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:06 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000000004005, 0x0) mmap(&(0x7f0000a6e000/0x1000)=nil, 0x1000, 0x8, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:33:06 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xfffffffffffff000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:07 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x1100000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:07 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xa0ba6d01000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:33:07 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x88470000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:07 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@xdp, &(0x7f0000000080)=0x80, 0x80800) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000000c0)=0x1, 0x4) mlock(&(0x7f0000791000/0x9000)=nil, 0x9000) 05:33:07 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x0, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:33:07 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x20) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2008001}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x4c, r2, 0x800, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x8840) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000140)) ptrace(0x10, r3) 05:33:07 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) write$eventfd(r1, &(0x7f0000000040)=0x3, 0x8) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:33:07 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x806000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:07 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x2000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:07 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xe47a01000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:33:07 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x88480000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:07 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x2}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:07 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x201221c0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:33:07 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:07 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xf000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:07 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x0, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:33:07 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x17a550000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:33:07 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x4305}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) [ 721.058519] syz-executor5 (24880) used greatest stack depth: 5512 bytes left 05:33:27 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000300)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="1900090000000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB="99111279dab8cadee439771cf661f706e1e946107b1cd8d66a05d39b940c"], @ANYBLOB="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"]) 05:33:27 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xfffff000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:27 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x28}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:27 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x0, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:33:27 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0b1062000000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:33:27 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xd4, r2, 0x200, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xc0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4fdb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe4a8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x48c38824}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x97}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x28e9d0a8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x55}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x268e}, @TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x1}, 0x840) futex(&(0x7f0000000240)=0x2, 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:33:27 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xe803000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:27 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x1400}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:27 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x400000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:27 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x14}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:27 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc031142000000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:33:27 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x500000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:28 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = memfd_create(&(0x7f0000000280)='{proc&md5sum!--em0q-\x00', 0x3) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x1}, 0x7) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x400001, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7fffffff, 0x480) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4008}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x1c, r4, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000800}, 0xc1) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f0000000140)) ptrace(0x10, r5) 05:33:28 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x3}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:28 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x0, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:33:28 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0c1162000000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:33:28 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x6b6b6b00}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) [ 734.162942] syz-executor5 (24945) used greatest stack depth: 2624 bytes left 05:33:43 executing program 3: setresuid(0x0, 0xee01, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x220000, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f00000001c0)={0x10000001}) nanosleep(&(0x7f0000000040)={r0, r1+10000000}, 0x0) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f0000000140)) ptrace(0x10, r5) 05:33:43 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x86ddffff00000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:43 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x88caffff00000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:43 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1c3b20000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:33:43 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x0, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:33:43 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x700}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:43 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xd000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:43 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x1f) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8001440}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, r2, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2bfb274d}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x124}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x10) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:33:43 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xb00000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:44 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x0, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:33:44 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xa00}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x4}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:44 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xcf8001000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:33:44 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x6000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:44 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x0, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:33:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x300000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:33:44 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0d1072000000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:33:44 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) socketpair(0x4, 0xa, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0xf0, r3, 0x100, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffffffff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsf0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x62}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x40000}, 0x24004010) 05:33:44 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xb}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:04 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x81000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:04 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, r0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x101100, 0x0) getsockname$netlink(r3, &(0x7f0000000080), &(0x7f0000000100)=0xc) write$tun(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="01040300090007000800000000000000000000000000f5c6ac3dccd568a18a9819a12af482bdae9d50099a2bd1f68cc049db5558dadcf5fd83af1913c3e84657e33aab2cb5801c5bec27e64ac31edd5779d1f3bf96156c44e4877584e14b7fb52d2167e65db4dd4c41a1dc341ca31a77b40c76b7278d44dd1d7154e39839d0340b8c4f083d8b88bbe64f072de6e6a7272d48aaa414ea4c0582ab65088f67b50017b1090e0a8f366b30f2137d7f83d1e2e31cc08344132f9cce8fa1308ac96d9803aee2dab34ef8c7644afe204974fc78011026ccbe4b35431f7fd9572c3d287518dbac9331e15384ef4dd13bf70b4483884f0445d02f55550b1dcf64e4"], 0xfd) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000140)) ptrace(0x10, r4) ioctl$PPPIOCSFLAGS(r2, 0x40047459, &(0x7f0000000000)=0x400000) fsync(r3) 05:34:04 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x0, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:34:04 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8004020000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:04 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc061102000000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:34:04 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000000)=0x4) futex(&(0x7f0000000040)=0x1, 0x8b, 0x2, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x1) 05:34:04 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x4788}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:04 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x88470000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:04 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x8dd701000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:34:05 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x4000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:05 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x3580}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:05 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x0, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:34:05 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)={0x0, 0xfffffffffffffffe}) ptrace(0x10, r1) 05:34:05 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x7}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:05 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0310020, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:34:05 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x40030000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:05 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x3f00000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:25 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x17865f000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:34:25 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x6488}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:25 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:34:25 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xfdffffff}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:25 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400000, 0x0) setns(r2, 0x4000000) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000040)=[0x23, 0x5]) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x10000, 0x0) ioctl$UI_SET_PHYS(r4, 0x4008556c, &(0x7f00000005c0)='syz0\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x5, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x2000000000000000, 0x6}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x200000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5, 0x20000) ioctl$GIO_SCRNMAP(r5, 0x4b40, &(0x7f0000000600)=""/226) r6 = semget$private(0x0, 0x4, 0x4) semctl$SEM_STAT(r6, 0x2, 0x12, &(0x7f0000000300)=""/208) semctl$GETPID(r6, 0x0, 0xb, &(0x7f0000000080)=""/20) semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0x9, 0x1800}], 0x1, &(0x7f0000000200)) setsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f00000000c0)=0xfff, 0x4) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000240)={[0x0, 0xc6, 0x7, 0x81, 0x3, 0x99, 0x7, 0x4, 0x81, 0x8, 0x7fff, 0x2, 0xff, 0xfffffffffffffff8, 0x101], 0xf000, 0x1000}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e22}}, 0xfff, 0x82b5}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r3, 0x12, 0x2, &(0x7f0000000100)=""/94, &(0x7f00000001c0)=0x5e) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000844000/0x1000)=nil, 0x1000, 0xa, 0x10012, r5, 0x0) accept(r5, &(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000540)=0x80) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000980)='/pro\\\xe3bcs/n\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00\x00\x00\x00\x86\xb6\x00\xa3\x13\x10\xf8c\xae\xf0\x1e\x90\x87\x9cF\x80Q\x00\x85\xfd\x1fe`^z\xca\x10\xfe\x1deL\xac\x04@\x1e+\xec~\"\xc8', 0x2, 0x0) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, &(0x7f0000000380)={[0xf000, 0x4, 0x2001, 0x3000], 0x0, 0xd8, 0x7}) 05:34:25 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="efcbfe9cdbf836a39f8102419f9a941fd38b6a659b16427e301578af01061e9f5fda9fb591df522fe254f721538fb0e0c6f5237bb45eeb53ae38f9a843234d4ab6e4d27cddd51eb52ba4eba78e196341aaa309ba096808e70495f083041fbb2884b21948d50da9fd5532deb851721816da70c5"], 0x73) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) r4 = socket$inet6(0xa, 0x803, 0xa) ioctl(r4, 0x1000008912, &(0x7f0000000640)="0a5c2d023c126285718070") r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x1) r6 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x4000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0x5e, "5797c47cb5e35a9e0192937b20412a1a7ac30ef5d6b27f79bf6ff5ee9cb7df6f5df6f29dcce02a737754edaae70569c6e288ce3c10a24f2e16bf942fa8d359d1e8a880e152ccf780d16d000ceaaaa8f286ac7f8e7227ff1ea14de1352de3"}, &(0x7f00000000c0)=0x66) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000100)={r7, @in6={{0xa, 0x4e22, 0x80000000, @remote, 0x1}}, 0x2, 0x9, 0x40, 0x58, 0xc}, 0x98) 05:34:25 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xe000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:25 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xfeffffff}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:25 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xffffca88}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:25 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x0, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:34:26 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0x0, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:34:26 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x300}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:26 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x182e06000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:34:26 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x0, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:34:26 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8100000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:26 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x800000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:26 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0e1162000000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:34:46 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8848000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:46 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x1010, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:34:46 executing program 3: r0 = geteuid() setresuid(r0, 0xee01, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) syz_read_part_table(0xfff, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000000)="bf255641a86dacf4b725048c316ff6ed104c3e06f7a3576761a403e46f9b8611d7cf4a471177fb09892aaf1061088db73b1355fdeaf0f9201e68fce0822db5a04b80681d52cc5f49b56b7ea043ba2e327cc292469ae300659925d4ab459c3454762fcfc6f929c34f4d96232e11b51278816c4225f6c54c2753f6aa3478566e39595130c6e003d417b2b723fd9e8abbd5c2fd1e5943960a5d1052940c6e7c7bbf72aa48", 0xa3, 0xffffffffffff0001}, {&(0x7f00000001c0)="2bec3ef38fc9a0401b495937208a80bd678de9d6ae930a1ec6a13451d1c65002d416a94ed551b248eb36b0ecea093ab041e76fa6fe224a24f0577806ac218e96001efb52cb4e65c56284ab79f95f2fe89b4a416b940ca4bc71d70287bdb3ef08ea4e", 0x62, 0x1ff}, {&(0x7f0000000240)="115a407c413de6ae159d911b2369f83bff9a7438effceb8e4f6357062d607e29f070d1d63daab231cc255f5b80955601af861dfdf83437c3abdbb7d34d44dfdcc8383d61835f7ab2768ff12f15298531ef63936daff37e0f07c527972b4428e398c1939b3022dcdf37cda28545769fa454911e1f4d5302026a3aa4b5b52ed5100fbdfca786ed8f00a5f1523b29a77ab561e4d28611b1396fd1e78f32f6e357528f2ad0d34ba60f06019aab64135a54713b0a7595230b75d32cfd5a211587ab8eb769beb8712450bd1beb5a9452d89f3c5c27d25339377856a2d582b616774932", 0xe0, 0x8}, {&(0x7f0000000340)="0cfab3a3f9e45dcb03b70ded762b414010dfaf0795791b5b073e3fa6e5dbbdb766ef166ce53e07643d5d8ac1a60e580908db613fd25888abbd16374e3aacbe9836c0593c93a48f165aaac8df9b2dbf7e31d22cfd49bdff3c", 0x58, 0x5}, {&(0x7f00000003c0)="e8011c6041f9399701cdc56ed07a4c8bfeb495e8d36d90e6d5f3470309350556de520d390e264eb20d48d1f4a3bdd917f28dcb8d763e96bd0c5171a04d02f44e83d357f78114788a7b8e5e3f62b51f0bc33838ec1f2a0d13db359017234506b09ea1ad885cb933a4e8b359e1895e1f917343bfa2296082a867e53eeeeb9245cf245dc43b25ea9e5d46db675c432df912bb39459d2a5c36b08ff03440d0b4f6eb01eb4c7a4e36b5dad8a176b6f2063d4c9cc454e4152db60324418eabddb82a17bf72b9255c1b50acd90490a8baf167053b41c8b5d174b8502767c472e8f5c8af06fdab64c3b000b16a38c5e53bcab9ea020ebe01f6293b", 0xf7, 0x8}]) ptrace(0x10, r2) 05:34:46 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x0, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:34:46 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8035000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:46 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0c2c101000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:34:46 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xfdffffff00000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:46 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) clock_getres(0x4, &(0x7f0000000000)) 05:34:46 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xf4010000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:46 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xb000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:46 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0e1122000000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:34:46 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x700}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:46 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x6000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:46 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x0, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:34:46 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) write$P9_RREMOVE(r2, &(0x7f0000000040)={0x7, 0x7b, 0x2}, 0x7) ptrace(0x10, r1) 05:34:46 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x543}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:46 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0b1042000000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:34:46 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x543}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:34:47 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x80350000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:07 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x800e0000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:07 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x200e01c0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:35:07 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x0) mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, r2, 0x0) ptrace(0x10, r1) 05:35:07 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x4888}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:07 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0x0, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:35:07 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() ptrace$poke(0x5, r1, &(0x7f0000000000), 0x1) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) 05:35:07 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x17794e000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:35:07 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x501, 0x40000) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast2, 0x4}}, [0x0, 0x3, 0x1, 0x1f, 0x8, 0x4, 0x3, 0x7f, 0x200, 0x80, 0x3, 0x80000001, 0x8, 0x1, 0x8]}, &(0x7f00000001c0)=0x100) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={r2, 0x710}, 0x8) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:35:07 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xa00000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:07 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) ptrace$getsig(0x4202, r0, 0x4, &(0x7f00000001c0)) setresuid(0x0, 0xee01, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) ptrace$setopts(0x4206, r1, 0xffffffffffffff15, 0x7) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x101000, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r3 = syz_open_procfs(r0, &(0x7f0000000100)='numa_maps\x00') getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000240), &(0x7f0000000280)=0x14) getpgrp(r0) clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000140)) ptrace(0x10, r4) bind$netlink(r3, &(0x7f00000002c0)={0x10, 0x0, 0x25dfdbfb, 0x80000}, 0xc) 05:35:07 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xd00}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:07 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xa000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:08 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x4001, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000080)={0x329ae3f4, 0x40}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f00000001c0)={0x4, 0x0, {0xffffffffffffffff, 0x3, 0x44, 0x1, 0x100}}) clone(0x44000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) gettid() ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'gretap0\x00', 0x1001}) prctl$PR_SET_KEEPCAPS(0x8, 0x1) ptrace(0x10, r2) 05:35:08 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x0, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:35:08 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8100}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:08 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x4000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001300)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, 0x0) r2 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f0000000ac0)='./file0\x00', 0x2) r3 = dup2(r0, r2) setresuid(0x0, 0xee01, 0x0) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000040)=0x0) r6 = creat(&(0x7f0000000000)='./file0\x00', 0x158) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xc}}, @in={0x2, 0x4e22, @local}], 0x20) ioctl$EVIOCSABS2F(r3, 0x401845ef, &(0x7f0000000280)={0x80000001, 0x1f, 0xb6, 0x86, 0x0, 0x438b}) ptrace$getregset(0x4204, r5, 0x6, &(0x7f0000000100)={&(0x7f0000000080)=""/60, 0x3c}) r7 = getpid() sched_setscheduler(r7, 0x800000000, &(0x7f0000000200)=0x9) rt_tgsigqueueinfo(r7, r7, 0x16, &(0x7f0000000140)) ioctl$EVIOCSABS2F(r4, 0x401845ef, &(0x7f00000001c0)={0x2, 0x8, 0x4, 0x7fffffff, 0x3ff, 0x3a24000000000000}) ptrace(0x10, r7) 05:35:08 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:35:08 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x201381c0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:35:28 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8847000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:28 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1c0227000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:35:28 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xe}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:28 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000080)=@v3={0x3000000, [{0x8, 0xffff}, {0x6, 0xfffffffffffffc00}], r1}, 0x18, 0x2) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) ptrace(0x10, r2) 05:35:28 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x0, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:35:28 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x6b6b6b00000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:28 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x80180, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0xfffffffffffffffd, 0x2b, 0x5, @buffer={0x0, 0xa1, &(0x7f0000000200)=""/161}, &(0x7f00000002c0)="94d5681dde751460a781d7ed634f8fd2f5f361c6bba159c8866f07d4eb0adea3b06889a561e623a0d7102c", &(0x7f0000000300)=""/1, 0x1, 0x10025, 0x0, &(0x7f0000000340)}) setresuid(0x0, 0xee01, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x8000, 0x40000) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000100)) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000040)=0x7fff) rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000140)) ptrace(0x10, r3) 05:35:28 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x6000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:28 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x400400, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)=0x7, 0x4) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000080)={0x8, 0x1f}) 05:35:28 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x3000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:28 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") fstat(r0, &(0x7f0000000000)) clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0xfffffffffffffffc}}, 0x30) ptrace(0x10, r1) r3 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10, 0x80000) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f0000000240)={0xfff, 0x838}, 0xc) 05:35:28 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x40000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:28 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:35:28 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x505ebf01000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:35:28 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) alarm(0xfffffffffffffffd) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) futex(&(0x7f0000000080)=0x10000000000, 0x800000002008, 0x0, 0x0, 0x0, 0x88000002) r1 = msgget(0x2, 0x4000000) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.syz\x00') msgctl$IPC_INFO(r1, 0x3, &(0x7f00000001c0)=""/125) 05:35:28 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x600}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:28 executing program 3: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000040)) setresuid(0x0, 0xee01, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) ptrace(0x10, r2) 05:35:28 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x88a8ffff}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:28 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:35:28 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x600000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:28 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, r3) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) 05:35:28 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xe80}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:28 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xf0947701000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:35:28 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x600000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:28 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xf401000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:28 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x7) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) ptrace(0x10, r2) 05:35:48 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) 05:35:48 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0) 05:35:48 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x1400000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:48 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x2000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:48 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x201521c0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:35:48 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:35:48 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x89060000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:48 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @rand_addr=0xfffffffffffffffb}, 0x4, 0x1, 0x0, 0x2}}, 0x2e) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x400080, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.nlink\x00', &(0x7f0000000340)=""/114, 0x72) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x5) fallocate(r1, 0x1, 0x7088feab, 0x800) setsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f00000001c0)="ed4caf4f8973e46da6f421899875de2173cd229ed3193d7fb69fdcec3b0110560302c567b0beceb59db24be03147798423e4486f7de8ebbc52b7293b1c7557d527e954ba34ecdb135eb9e16c", 0x4c) ioctl(r2, 0x1000018912, &(0x7f00000002c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000140)={0x0, 0x3ff, 0x80000001, [], &(0x7f0000000100)=0x4}) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x18, &(0x7f0000000240)={0xa, 0x0, 0x6}) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) 05:35:48 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x20000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:49 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000040)={0x2, [0x0, 0x0]}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000400)={r3, @in6={{0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1b}}}}, 0x104a, 0xfffffffffffffff8, 0x100, 0x9db, 0x48}, 0x98) r4 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xb1, "9bca67b8bfa3c02213cdf0a8a151ce4b8ed5108eb3d7fd6f79efbaeacf22479c566247912ef653233a6bcee05edde7555ac450032f6a3aab3ed5f650ae4e0ce13987efd53af7313ec1575a7ea7b61a3588749131aa5e4ede24e9c08a3f5467e99199db9942be075db3c8dfdbb3e964416eeb788dce5fb51a8bb91db3ecc3cdea88730b30abc698e0b84f64c2030df673c7b6a939bf50e0a5509de456c6f2154969bb01694e718eb0d8c7524003060baa64"}, &(0x7f0000000280)=0xb9) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f00000002c0)={r5, @in6={{0xa, 0x4e22, 0x400, @local, 0x1ff}}, [0xa42d, 0x9, 0x8, 0x0, 0x5a6c, 0xa4b3, 0x0, 0x3, 0x7fff, 0x0, 0x9, 0xffff, 0x300, 0x5, 0xffffffffffff0000]}, &(0x7f00000003c0)=0x100) 05:35:49 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1b42cd000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:35:49 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x60000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:49 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8847}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:35:49 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:35:49 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) setresuid(r0, 0xee01, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TCSETSW(r3, 0x5403, &(0x7f0000000140)={0x7, 0x7, 0x6, 0x3, 0x11, 0x1, 0x7f, 0x3, 0x20, 0x7fffffff, 0x0, 0x6}) rt_tgsigqueueinfo(r2, r2, 0x200000000014, &(0x7f0000000040)={0x1, 0x7}) ptrace(0x10, r2) 05:35:49 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x2004f1c0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:36:09 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x4888}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:09 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:36:09 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1c0165000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:36:09 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8000, 0x800) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000040)={0x1, {{0x2, 0x4e24, @rand_addr=0xb906}}}, 0x88) 05:36:09 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0a5c2d023c1202007180709f0367f2c4aab392a67153dabf09dbad272d892cfbdaf744e31b1af7962b926bf4b3e3ad26a48d46b304894e169fafacf52a918ca91f389a093035050642fca701a03d95e4f29d8386024a303222bdd7557f6491e5d5023cf3cdb64ae76ac85e3b5eb289a47f4c6f862256c6ceb41dd8e9cb2e76827b7d7b6370b47bbe52f32c34bb488007f189553543b0987cf69f83f4f26df2e52f673c673fa1678665ef9035ac0ffd55701dd16273ebf7bbda7cf9cde08274064845f8aa21a62fe8dbf5a3435400aff4c6bd04c28d290000000000000000000000") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) r2 = semget(0x3, 0x0, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) ptrace(0x10, r1) 05:36:09 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x4305}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:09 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x1, 0x0) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000040)={0x400, 0x5401}) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) ptrace(0x10, r2) 05:36:09 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "", [[], []]}, 0x258) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:36:09 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8848000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:09 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x689}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:09 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) seccomp(0x2, 0x1, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x3, 0xfc00000000000000, 0x1ff, 0x20}]}) 05:36:09 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x2800000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:09 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xd}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:29 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./file0\x00', 0x1, 0x4c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x117}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000140)) ptrace(0x10, r3) 05:36:29 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x4000000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:29 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2, 0x111100) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000080)=0x6) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) futex(&(0x7f0000000000), 0x9, 0x1, 0x0, 0x0, 0x0) 05:36:29 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8035000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:29 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x182b13000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:36:29 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b0", [[], []]}, 0x294) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:36:29 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x700000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:29 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@empty, @in=@local}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000040)=0xfffffffffffffffe) rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) ptrace(0x10, r2) 05:36:29 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x88480000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:29 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x88640000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:29 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() r2 = creat(&(0x7f0000000000)='./file0\x00', 0x20) ioctl$VIDIOC_S_INPUT(r2, 0xc0045627, &(0x7f0000000040)=0x10001) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000001c0)) ptrace(0x10, r1) 05:36:29 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x1f4}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:29 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x182e04000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:36:30 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b0", [[], []]}, 0x294) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:36:30 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x14000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:30 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xfeffffff}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:30 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x17, &(0x7f0000000000)={0x0, 0x100000000004, 0x401}) ptrace(0x10, r1) [ 905.146564] device bridge_slave_1 left promiscuous mode [ 905.152183] bridge0: port 2(bridge_slave_1) entered disabled state [ 905.167905] device bridge_slave_0 left promiscuous mode [ 905.173500] bridge0: port 1(bridge_slave_0) entered disabled state [ 905.247682] team0 (unregistering): Port device team_slave_1 removed [ 905.261356] team0 (unregistering): Port device team_slave_0 removed [ 905.286591] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 905.307894] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 905.364624] bond0 (unregistering): Released all slaves 05:36:51 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0", [[], []]}, 0x2b2) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:36:51 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x200000000000, 0x800) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x20, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x880) clone(0x1020400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000140)) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x300, 0x70bd29, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000050) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.sockprotoname\x00', &(0x7f0000000080)='.!\x00', 0x3, 0x3) ptrace(0x10, r3) 05:36:51 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xf0}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:51 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x7000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:51 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1d93e3000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:36:51 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004001, 0x0) mmap(&(0x7f00006dc000/0x4000)=nil, 0x4000, 0x3000005, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) io_setup(0x3, &(0x7f0000000000)=0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) io_getevents(r1, 0x12, 0x5, &(0x7f0000000040)=[{}, {}, {}, {}, {}], &(0x7f0000000140)={r2, r3+30000000}) 05:36:51 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f000091e000/0x3000)=nil, 0x3000, 0x200000e, 0x10010, r0, 0xfffffffffffffffd) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000140)={0x2, 0x0, @pic={0x6, 0x80, 0x9, 0x4, 0x0, 0x2, 0x7, 0x4, 0x80000001, 0x1f, 0x49a, 0xf5b, 0x1, 0x5, 0x2, 0x865d}}) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x187, 0x80) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x56) ioctl$VIDIOC_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x2, 0x100000000, 0x2, 0x101, 0x4, 0x8, 0x11, 0x5}}) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:36:51 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:51 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xf000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:51 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0", [[], []]}, 0x2b2) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:36:51 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x800000001, 0x0) dup2(r0, r0) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x4, 0x100) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4001, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040)=0x5, &(0x7f0000000080)=0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000008, 0x0, 0x0, 0x0, 0xfffffffffffffffd) 05:36:51 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982", [[], []]}, 0x2c1) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:36:51 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8906}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) [ 925.395061] IPVS: ftp: loaded support on port[0] = 21 [ 926.292291] bridge0: port 1(bridge_slave_0) entered blocking state [ 926.298872] bridge0: port 1(bridge_slave_0) entered disabled state [ 926.306202] device bridge_slave_0 entered promiscuous mode [ 926.333241] bridge0: port 2(bridge_slave_1) entered blocking state [ 926.339759] bridge0: port 2(bridge_slave_1) entered disabled state [ 926.346850] device bridge_slave_1 entered promiscuous mode [ 926.374390] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 926.402596] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 926.481338] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 926.510774] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 926.634908] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 926.642228] team0: Port device team_slave_0 added [ 926.667932] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 926.675120] team0: Port device team_slave_1 added [ 926.702312] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 926.731231] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 926.762765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 926.791328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 927.047691] bridge0: port 2(bridge_slave_1) entered blocking state [ 927.054066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 927.060732] bridge0: port 1(bridge_slave_0) entered blocking state [ 927.067126] bridge0: port 1(bridge_slave_0) entered forwarding state [ 928.004791] 8021q: adding VLAN 0 to HW filter on device bond0 [ 928.094606] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 928.186918] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 928.193043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 928.201441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 928.290605] 8021q: adding VLAN 0 to HW filter on device team0 05:36:55 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f000019c000/0x2000)=nil, 0x2000, 0x8, 0x10, r0, 0x1) get_thread_area(&(0x7f0000000000)={0x7ff, 0xffffffffffffffff, 0x2400, 0x6, 0x0, 0x8000, 0x917, 0x9, 0xffffffff, 0x8523}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0xc4101, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000080)) ioctl$RTC_VL_CLR(r1, 0x7014) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x200000, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:36:55 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x200000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:55 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5e", [[], []]}, 0x2c8) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:36:55 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f00000001c0)={0x0, {{0x2, 0x4e21, @broadcast}}, {{0x2, 0x4e24, @multicast1}}}, 0x108) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) ptrace(0x10, r2) 05:36:55 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0c1042000000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:36:55 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8847}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:55 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x4305000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:55 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8035}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:55 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x3) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x1, 0x4102) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r2, 0x0, 0x1000, 0xfb, &(0x7f0000000580)="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", &(0x7f0000000100)=""/251, 0x7}, 0x28) syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0xfd) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:36:55 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8864000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:55 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x90b879, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:36:55 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8100}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:55 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xf0ffff}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:55 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x800000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:55 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5e", [[], []]}, 0x2c8) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:36:56 executing program 3: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setopts(0x4206, r0, 0x5, 0x20) setresuid(0x0, 0xee01, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r2 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x20000, 0x0) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x4e22, 0x2008, @mcast1, 0x8}, 0x1c) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x100) ioctl$VIDIOC_TRY_DECODER_CMD(r3, 0xc0485661, &(0x7f0000000040)={0x7, 0x0, @stop_pts=0x79}) clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000140)) ptrace(0x10, r4) 05:36:56 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x180989000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:36:56 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x6000000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:56 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xd000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:36:56 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x1000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:15 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x3f000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:15 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x17865e000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:37:15 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x28000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:15 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) socket$inet_udplite(0x2, 0x2, 0x88) 05:37:15 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5e", [[], []]}, 0x2c8) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:37:15 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:37:15 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x186ec4000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:37:15 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8906}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:15 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c", [[], []]}, 0x2cc) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:37:15 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x86ddffff}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:15 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xd00}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:15 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xb}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:15 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084", [[], []]}, 0x2ce) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:37:16 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:37:16 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x700000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:16 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1d8fda000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:37:16 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8906000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:36 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() ptrace$peekuser(0x3, r1, 0x101) r2 = accept(r0, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x2, 0x480, 0x8208, 0x1, 0x101, 0x1f, 0x7, 0xffffffff, 0x0}, &(0x7f0000000240)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000280)={r3, 0x9}, 0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000080)={0x0, 0xa2b}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f00000001c0)={r4, 0x5}, 0x8) ptrace$getenv(0x4201, r1, 0x3, &(0x7f0000000000)) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x4) 05:37:37 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x305bc001000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:37:37 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:37 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8"}, 0xcf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:37:37 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8864000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:37 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0d11620, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:37:37 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x140, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)=0x0) ptrace$getregs(0xc, r1, 0x10001, &(0x7f00000000c0)=""/176) creat(&(0x7f0000000000)='./file0\x00', 0x2) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:37:37 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x1400}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:37 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xd00000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:37 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:37:37 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x300}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:37 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0111620, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:37:37 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x2000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:37 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x86ddffff}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:37 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x11}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:37 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1b6da8000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:37:37 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0xcc01, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)={0x5, 0x0, 0x40000000000}) ptrace(0x10, r1) 05:37:37 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8"}, 0xcf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:37:37 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8847000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:37 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x806}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:38 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") [ 993.152217] syz-executor5 (26182) used greatest stack depth: 632 bytes left 05:37:59 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x2800000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:59 executing program 3: setresuid(0x0, 0xee01, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x8000) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x8c) r2 = socket$inet6(0xa, 0x6, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000240)=""/141, 0x8d, 0x10000, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1af8ff0000000069a2f8ff00000000bf2000000000000095"], 0x0}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x11, 0x80002, 0x0) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000300)={0x3ff}, 0x8, 0x80000) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000580)=0x8be7) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000006c0)=0xfffffffffffffffa) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000680)=ANY=[@ANYBLOB="991cefda1234be", @ANYRES32=0x0], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000000440)={r5, 0x1}, 0x8) r6 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x8}, &(0x7f0000000200)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlinkat(r2, &(0x7f00000003c0)='./file0\x00', 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0xc9, 0x0, {0x400300}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) setxattr$security_smack_entry(0x0, &(0x7f0000000500)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x2) prctl$PR_GET_SECUREBITS(0x1b) r7 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r7, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 05:37:59 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x0, 0x0, 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:37:59 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xffffa888}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:59 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0c1052000000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:37:59 executing program 5: prctl$PR_GET_KEEPCAPS(0x7) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000800)=ANY=[@ANYBLOB="242b0e541ba87c647d82a4de2cbfd20898bc2d7e1e3a7de70689d9c69ec40218d993be848392a7c11425147e2d9019624bd0dda197098d954f345f40e9580aebbec63a1e239c2fc6a43c2c57f8c7439a3ecb78470000000000242c560a0b665e708d0f7a416951f787d9b21ee440447f0e85b1483916555e3c129383f057432da05f46853a36e396302c74b5ab1f80c78c4d62f4aa60aea9b5a343430f325b7fbc2cf942a4c650c8905fe06ab68346cbbfdafd6d87c64f0d83d2f0126e50f018abd18ebca85a4252a7252a972e8df055515caec335517b1c6ae9d78cb0711a6888a63c8142088f954ec3b25f7ba74baddac0"], 0x0) r2 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x0, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r3 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r2, r3, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r2, 0x4c01) socket(0x0, 0x0, 0x10001) 05:37:59 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xfffffffd}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:59 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xfeffffff00000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:59 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x80adc001000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:37:59 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x88caffff}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:37:59 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x0, 0x0, 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:37:59 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x800e000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:00 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) 05:38:00 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x89060000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:00 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x0, 0x0, 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:38:00 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x2009c201000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:38:00 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x1400000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:00 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x0, &(0x7f0000000180), 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:38:00 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x8060000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:00 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x88caffff00000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:00 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000180), 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000040)) 05:38:00 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x0, &(0x7f0000000180), 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:38:00 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x600}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:00 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0e1032000000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:38:00 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x0, &(0x7f0000000180), 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:38:00 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x4305000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:00 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0x88a8ffff00000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:00 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1d8bec000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:38:00 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000300)={0x0, 0x3, 0x1, 0x0, 0x9}) setresuid(0x0, 0xee01, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) wait4(r2, &(0x7f00000004c0), 0xf, &(0x7f0000000400)) r3 = dup2(r1, r1) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f0000000240)={'nat\x00', 0x0, 0x3, 0x46, [], 0x9, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000001c0)=""/70}, &(0x7f0000000100)=0x78) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}) ptrace(0x10, r4) 05:38:01 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xe803}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:01 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0x88640000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:01 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:38:21 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0x4000000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:21 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x32, "8d79e7044a3a4bb844a4e7e7803bd6be625a7221c049aa45d59fe274fd465f8bf108019f80c7d2f483c492e574f62e282c2e"}, &(0x7f0000000080)=0x3a) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f00000000c0)={r2, 0x7, 0xfffffffffffffc00}, 0x8) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:38:21 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x800e}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:21 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2500, 0x0) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000040)) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) 05:38:21 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:38:21 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x5}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:21 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x200351c0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:38:21 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0xf0}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:21 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(0x0, 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:38:21 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xe80}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:21 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0x2800}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:21 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x108288, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:38:21 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0x1400000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:41 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x8082, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040)=0x2, 0x4) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) ptrace(0x10, r2) 05:38:41 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0x8060000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:41 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(0x0, 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:38:41 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1cc66f000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:38:41 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xfffffffffffff000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:41 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0xfdffffff00000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:41 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:38:41 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0x8847}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:41 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc), 0x800000000008, 0x3, 0x0, 0x0, 0x0) 05:38:41 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x20480}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:41 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x17c014000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:38:41 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0x400000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:41 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(0x0, 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:38:42 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:38:42 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x808000000000012, r1) 05:38:42 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x3e8}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:42 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0x2800000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:42 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1d9642000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:38:42 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0x28000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:38:42 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x88640000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:02 executing program 3: setresuid(0x0, 0xee01, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000240)=0x0) ptrace$setsig(0x4203, r0, 0x6, &(0x7f0000000280)={0xc, 0x8001, 0x3}) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x100, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000200)={0xa432, 0x1, 0x3, 0x0, 0x5}, 0xc) rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000380)='\x00', 0x1, 0x3) ptrace(0x10, r2) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20001) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000040)={0x2, 0x8004, 0x4, 0x19e0000000000000, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000100)={r5, 0x7}, 0x8) 05:39:02 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0x81000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:02 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x80350000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:02 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x401, 0x1) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040)=0x5, 0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) futex(&(0x7f000000cffc)=0x100000, 0x800000000048, 0x0, 0x0, 0x0, 0x0) 05:39:02 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x200b91c0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:39:02 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:39:02 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0xd}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:02 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x4000000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:02 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1801b6000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:39:02 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0x6b6b6b00}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:03 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xfdffffff}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:03 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x2002b1c0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:39:03 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0xb}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:03 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:39:03 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xe00}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:03 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x8079b900000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:39:23 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000540)='/dev/audio#\x00', 0x20, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000005c0)={r1}) getsockopt$inet6_int(r1, 0x29, 0xcf, &(0x7f0000000600), &(0x7f0000000640)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@multicast1, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000000)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) getresuid(&(0x7f0000000080), &(0x7f0000000100), &(0x7f00000003c0)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) setresuid(r3, r2, 0x0) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") write$P9_RSTAT(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="520000007d020000004b000100040000004400000000000000008040144200100100000200000000000009652fbe5ece64696f230000000c002f6465762f617564696f236cb96cbfa28a5ad1db1d2d31639b24000000b4aa1c20b80000000000008d0850b936a90109975afb9c899f7f004490ce7792b53fc81884f983f84b71f44a0667cecf6eecc528552d3c909a35fc272bcfd2016aacca7a039d74b79d53ba13b2d159a65995107811182ef2097beb73bd2c3ccd30e68bc3e571a5fcc4a2b52d364a67aa9004911e8ba92485e6b4e8fb45bfaedbbd037ffdd29673d0b582790541f9186a7ce55275d5fa741242e2e483"], 0x52) clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000700)={0x698}, 0x4) r5 = getpid() getsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000680)={@loopback, @dev, @loopback}, &(0x7f00000006c0)=0xc) rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f0000000140)) ptrace(0x10, r5) 05:39:23 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x506ebc01000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:39:23 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x300000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:23 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3, 0x111000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0xffffffffffff7fff, 0x0, 0x1, 0x7, 0x58, 0x7, 0x6, 0xf628, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000000c0)={r2, 0x400}, 0x8) futex(&(0x7f000000cffc), 0x800000000008, 0x0, 0x0, 0x0, 0x0) 05:39:23 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0xfffff000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:23 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:39:23 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0x2000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:23 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xe8030000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:23 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x2008a1c0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:39:23 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0xd000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:23 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x806}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:23 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:39:24 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x166dce000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:39:24 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0x2}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:24 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x200000000000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:24 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:39:24 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x28, r3, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x20000000) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) 05:39:43 executing program 3: setresuid(0x0, 0xee01, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x101000) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000100)=0x44) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000140)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$getsig(0x4202, r3, 0x7fffffff, &(0x7f00000001c0)) ptrace(0x10, r2) 05:39:43 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xfffffffd}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:43 executing program 1: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[]]}, 0x1cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0") 05:39:44 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x201561c0, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:39:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0x6b6b6b00000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:44 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x80) futex(&(0x7f000000cffc), 0x82, 0xfffffffffffffffe, 0x0, 0x0, 0x0) 05:39:44 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xfffff000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0xb000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:44 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc021032000000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:39:44 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x88a8ffff}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0xb00}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:44 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x500}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0xffffdd86}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:44 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xf0107f01000000, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") 05:39:44 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0x0, 0x7000000}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:44 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x51000008912, &(0x7f0000000000)="0a5c2d023c126285718070") syz_emit_ethernet(0x36, &(0x7f00000008c0)={@link_local={0x1, 0x80, 0xc2, 0x4788, 0xa}, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 05:39:44 executing program 4: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@ipv4={[], [], @broadcast}, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x7063bf8c, 0x7, 0xafb5, 0x9, 0x6, 0x3, 0x3f, 0x12, 0x76, 0x38, 0x2b0, 0x2, 0xe8ec, 0x20, 0x2, 0xf131, 0x3, 0x8000}, [{0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x7}], "33298ee4a1dc468e5ea91805ab25a7febb37d61ca25534a57efd634a33e052c260b6f27c4e8943227dd5c329319ec204114a9cfac9ea9a4f443ba4b06fc9553460f0f362884c81092e702d25afebfb1fea130c9f447c215c5df0be189cd31e3298a5d978b326409982cd8f902a145f5ea5a2998c7084a8", [[], []]}, 0x2cf) kexec_load(0x200511c0, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0xc0a10d20, 0x1000000}], 0x0) lookup_dcookie(0x0, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x151) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x301040, 0x0) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000300)={0x2, 0x8f17, 0x100000001, 0x5f95, 0x1, 0x9}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8002) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0xffffffffffffff9d) ioctl(r0, 0x800, &(0x7f0000000380)="1cd863edc7f844bf83d4ff78f12588bf44a17a079d8f91249caefd3d1616dffc6497f44d51df01564d12be210289cf0447077d3f1d9c6ab90d69b62109f712a8fd7341d25afa59b7db0ca4fa262b9c4a12b401d7532bb7cef585bf1bfe933788525a01a4127d7f83186c4df86ed647777f174025421b280e7f55f7a1ac0f0bd9b43165790b1745440fc483f535b1715166dfb76e37d434fe1efa68c4b7ca50a0070f691b31") [ 1101.657798] Kernel panic - not syncing: corrupted stack end detected inside scheduler [ 1101.666135] CPU: 1 PID: 11511 Comm: kworker/u4:6 Not tainted 4.20.0-rc7+ #157 [ 1101.673414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.682889] Workqueue: writeback wb_workfn (flush-8:0) [ 1101.688201] Call Trace: [ 1101.690796] dump_stack+0x244/0x39d [ 1101.694436] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1101.699691] panic+0x2ad/0x55c [ 1101.702912] ? add_taint.cold.5+0x16/0x16 [ 1101.707118] ? zap_class+0x640/0x640 [ 1101.710848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.716400] ? check_preemption_disabled+0x48/0x280 [ 1101.721430] ? check_preemption_disabled+0x3a/0x280 [ 1101.726473] __schedule+0x21c6/0x21d0 [ 1101.730263] ? __sched_text_start+0x8/0x8 [ 1101.734457] ? blk_init_request_from_bio+0x3c0/0x3c0 [ 1101.739550] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1101.744633] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1101.749720] ? trace_hardirqs_on+0xbd/0x310 [ 1101.754038] ? kasan_check_read+0x11/0x20 [ 1101.758174] ? prepare_to_wait_exclusive+0x1a6/0x480 [ 1101.763262] ? trace_hardirqs_off_caller+0x310/0x310 [ 1101.768350] ? lock_downgrade+0x900/0x900 [ 1101.772484] schedule+0xfe/0x460 [ 1101.775861] ? prepare_to_wait_exclusive+0x1a6/0x480 [ 1101.780974] ? __schedule+0x21d0/0x21d0 [ 1101.784996] ? do_wait_intr+0x400/0x400 [ 1101.789021] ? __lock_acquire+0x62f/0x4c20 [ 1101.793251] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1101.798278] ? rq_wait_inc_below+0x152/0x1b0 [ 1101.802673] ? sysv68_partition+0xcf0/0xcf0 [ 1101.806986] io_schedule+0x1c/0x70 [ 1101.810522] wbt_wait+0x839/0x11a0 [ 1101.814045] ? wbt_wake_function+0x840/0x840 [ 1101.818457] ? kasan_check_read+0x11/0x20 [ 1101.822600] ? do_raw_spin_unlock+0xa7/0x330 [ 1101.826995] ? do_raw_spin_trylock+0x270/0x270 [ 1101.831581] ? blk_mq_sched_free_hctx_data+0x1f0/0x1f0 [ 1101.837055] ? check_preemption_disabled+0x48/0x280 [ 1101.842082] ? trace_event_raw_event_wbt_step+0x480/0x480 [ 1101.847642] ? dd_request_merged+0x130/0x130 [ 1101.852039] ? __sanitizer_cov_trace_cmp2+0x18/0x20 [ 1101.857044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.862581] ? check_preemption_disabled+0x48/0x280 [ 1101.867583] ? wbt_wake_function+0x840/0x840 [ 1101.871974] rq_qos_throttle+0x8d/0xf0 [ 1101.875849] blk_mq_make_request+0x4c8/0x2590 [ 1101.880334] ? find_held_lock+0x36/0x1c0 [ 1101.884381] ? blk_mq_try_issue_directly+0x1e0/0x1e0 [ 1101.889483] ? zap_class+0x640/0x640 [ 1101.893183] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.898705] ? check_preemption_disabled+0x48/0x280 [ 1101.903720] ? __lock_is_held+0xb5/0x140 [ 1101.907774] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1101.913294] ? generic_make_request_checks+0x5fb/0x26c0 [ 1101.918647] ? trace_event_raw_event_block_rq_requeue+0x6d0/0x6d0 [ 1101.924863] ? __lock_is_held+0xb5/0x140 [ 1101.928926] ? __lock_is_held+0xb5/0x140 [ 1101.933003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.938528] ? perf_trace_sched_process_exec+0x860/0x860 [ 1101.943996] ? lru_add_drain_cpu+0x1c0/0x500 [ 1101.948408] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1101.953479] ? mpage_prepare_extent_to_map+0x13d0/0x19c0 [ 1101.958924] ? ext4_block_write_begin+0x1870/0x1870 [ 1101.963977] ? save_stack+0x43/0xd0 [ 1101.967617] ? kasan_slab_alloc+0x12/0x20 [ 1101.971747] ? kmem_cache_alloc+0x12e/0x730 [ 1101.976069] ? ext4_init_io_end+0x96/0x220 [ 1101.980286] ? ext4_writepages+0x13d9/0x41a0 [ 1101.984678] generic_make_request+0x9b1/0x18a0 [ 1101.989264] ? kthread+0x35a/0x440 [ 1101.992807] ? blk_get_request+0x800/0x800 [ 1101.997036] ? zap_class+0x640/0x640 [ 1102.000754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.006294] ? check_preemption_disabled+0x48/0x280 [ 1102.011315] ? __lock_is_held+0xb5/0x140 [ 1102.015374] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1102.020376] submit_bio+0xba/0x460 [ 1102.023907] ? submit_bio+0xba/0x460 [ 1102.027614] ? generic_make_request+0x18a0/0x18a0 [ 1102.032442] ? ext4_end_io_rsv_work+0x920/0x920 [ 1102.037099] ? __lock_is_held+0xb5/0x140 [ 1102.041151] ext4_io_submit+0x197/0x230 [ 1102.045113] ext4_writepages+0x1418/0x41a0 [ 1102.049354] ? ext4_mark_inode_dirty+0xb20/0xb20 [ 1102.054095] ? print_usage_bug+0xc0/0xc0 [ 1102.058145] ? io_schedule+0x1c/0x70 [ 1102.061844] ? __wait_on_bit+0x92/0x130 [ 1102.065827] ? __lock_acquire+0x62f/0x4c20 [ 1102.070057] ? init_wait_var_entry+0x1a0/0x1a0 [ 1102.074626] ? print_usage_bug+0xc0/0xc0 [ 1102.078674] ? __lock_acquire+0x62f/0x4c20 [ 1102.082917] ? mark_held_locks+0x130/0x130 [ 1102.087153] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1102.092673] ? __ext4_get_inode_loc+0x470/0x1330 [ 1102.097432] ? update_load_avg+0x387/0x2470 [ 1102.101744] ? mark_held_locks+0x130/0x130 [ 1102.105963] ? zap_class+0x640/0x640 [ 1102.109660] ? kasan_check_write+0x14/0x20 [ 1102.113903] ? __brelse+0x104/0x180 [ 1102.117526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.123157] ? check_preemption_disabled+0x48/0x280 [ 1102.128161] ? ext4_mark_inode_dirty+0xb20/0xb20 [ 1102.132916] do_writepages+0x9a/0x1a0 [ 1102.136744] ? ext4_mark_inode_dirty+0xb20/0xb20 [ 1102.141483] ? do_writepages+0x9a/0x1a0 [ 1102.145454] __writeback_single_inode+0x20a/0x1660 [ 1102.150368] ? __mark_inode_dirty+0x1510/0x1510 [ 1102.155028] ? find_held_lock+0x36/0x1c0 [ 1102.159079] ? find_held_lock+0x36/0x1c0 [ 1102.163126] ? wbc_attach_and_unlock_inode+0x5c0/0xa30 [ 1102.168402] ? lock_downgrade+0x900/0x900 [ 1102.172558] ? find_held_lock+0x13f/0x1c0 [ 1102.176704] ? kasan_check_read+0x11/0x20 [ 1102.180836] ? do_raw_spin_unlock+0xa7/0x330 [ 1102.185223] ? do_raw_spin_trylock+0x270/0x270 [ 1102.189786] ? __lock_is_held+0xb5/0x140 [ 1102.193833] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1102.199376] ? wbc_attach_and_unlock_inode+0x675/0xa30 [ 1102.204651] ? __writeback_single_inode+0x1660/0x1660 [ 1102.209825] writeback_sb_inodes+0x71f/0x1210 [ 1102.214308] ? wbc_detach_inode+0x940/0x940 [ 1102.218625] ? lock_release+0xa00/0xa00 [ 1102.222587] ? down_read_trylock+0xda/0x140 [ 1102.226901] ? trylock_super+0x22/0x110 [ 1102.230854] ? downgrade_write+0x270/0x270 [ 1102.235123] ? queue_io+0x3dd/0x800 [ 1102.238773] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1102.244308] __writeback_inodes_wb+0x1b9/0x340 [ 1102.248888] ? writeback_sb_inodes+0x1210/0x1210 [ 1102.253639] ? __lock_is_held+0xb5/0x140 [ 1102.257687] wb_writeback+0xa73/0xfc0 [ 1102.261482] ? writeback_inodes_wb.constprop.50+0x330/0x330 [ 1102.267176] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1102.272172] ? wb_over_bg_thresh+0x88c/0xcb0 [ 1102.276574] ? wb_update_bandwidth+0x1e0/0x1e0 [ 1102.281138] ? print_usage_bug+0xc0/0xc0 [ 1102.285198] ? string+0x225/0x2d0 [ 1102.288652] ? widen_string+0x2e0/0x2e0 [ 1102.292609] ? mark_held_locks+0xc7/0x130 [ 1102.296742] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1102.301743] ? find_next_bit+0x104/0x130 [ 1102.305803] ? cpumask_next+0x41/0x50 [ 1102.309597] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1102.314597] ? inode_sleep_on_writeback+0x240/0x240 [ 1102.319599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.325141] ? check_preemption_disabled+0x48/0x280 [ 1102.330139] ? wb_workfn+0x521/0x1790 [ 1102.333943] ? wb_workfn+0x521/0x1790 [ 1102.337729] ? __local_bh_enable_ip+0x160/0x260 [ 1102.342386] wb_workfn+0xd65/0x1790 [ 1102.346011] ? __lock_acquire+0x62f/0x4c20 [ 1102.350245] ? inode_wait_for_writeback+0x40/0x40 [ 1102.355076] ? set_next_entity+0x493/0xc70 [ 1102.359344] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.364862] ? check_preemption_disabled+0x48/0x280 [ 1102.369861] ? zap_class+0x640/0x640 [ 1102.373587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.379122] ? __perf_event_task_sched_out+0x33a/0x1bf0 [ 1102.384474] ? pick_next_task_fair+0xa05/0x1b30 [ 1102.389138] ? debug_object_deactivate+0x2eb/0x450 [ 1102.394049] ? lock_downgrade+0x900/0x900 [ 1102.398185] ? find_held_lock+0x36/0x1c0 [ 1102.402233] ? zap_class+0x640/0x640 [ 1102.405987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1102.411526] ? check_preemption_disabled+0x48/0x280 [ 1102.416529] ? __lock_is_held+0xb5/0x140 [ 1102.420583] process_one_work+0xc90/0x1c40 [ 1102.424829] ? mark_held_locks+0x130/0x130 [ 1102.429054] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 1102.433702] ? __switch_to_asm+0x40/0x70 [ 1102.437761] ? __switch_to_asm+0x34/0x70 [ 1102.441813] ? __switch_to_asm+0x34/0x70 [ 1102.445856] ? __switch_to_asm+0x40/0x70 [ 1102.449908] ? __switch_to_asm+0x34/0x70 [ 1102.453971] ? __switch_to_asm+0x40/0x70 [ 1102.458032] ? __switch_to_asm+0x34/0x70 [ 1102.462075] ? __switch_to_asm+0x40/0x70 [ 1102.466121] ? __schedule+0x8d7/0x21d0 [ 1102.470001] ? zap_class+0x640/0x640 [ 1102.473697] ? lock_downgrade+0x900/0x900 [ 1102.477832] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1102.482406] ? lock_acquire+0x1ed/0x520 [ 1102.486363] ? worker_thread+0x3e0/0x1390 [ 1102.490533] ? kasan_check_read+0x11/0x20 [ 1102.494678] ? do_raw_spin_lock+0x14f/0x350 [ 1102.498982] ? kasan_check_read+0x11/0x20 [ 1102.503128] ? rwlock_bug.part.2+0x90/0x90 [ 1102.507361] ? trace_hardirqs_on+0x310/0x310 [ 1102.511773] worker_thread+0x17f/0x1390 [ 1102.515737] ? process_one_work+0x1c40/0x1c40 [ 1102.520225] ? __sched_text_start+0x8/0x8 [ 1102.524369] ? __kthread_parkme+0xce/0x1a0 [ 1102.528601] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1102.533702] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1102.538786] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1102.543362] ? trace_hardirqs_on+0xbd/0x310 [ 1102.547669] ? kasan_check_read+0x11/0x20 [ 1102.551800] ? __kthread_parkme+0xce/0x1a0 [ 1102.556022] ? trace_hardirqs_off_caller+0x310/0x310 [ 1102.561116] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1102.566205] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1102.571724] ? __kthread_parkme+0xfb/0x1a0 [ 1102.575970] ? process_one_work+0x1c40/0x1c40 [ 1102.580467] kthread+0x35a/0x440 [ 1102.583819] ? kthread_stop+0x900/0x900 [ 1102.587778] ret_from_fork+0x3a/0x50 [ 1102.592724] Kernel Offset: disabled [ 1102.596613] Rebooting in 86400 seconds..