0)=""/61, 0x3d) clock_gettime(0x0, &(0x7f0000000500)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000007c0)}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) link(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00') msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) clock_gettime(0x0, &(0x7f0000000340)) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000140)=&(0x7f00000000c0)) eventfd(0x0) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x4008000, &(0x7f0000001000)={0x2, 0x4e22, @broadcast}, 0x10) dup2(r0, r1) 03:33:42 executing program 0: keyctl$set_reqkey_keyring(0x14, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000140)=0xc) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x7530}) getpid() inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000300)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000540)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000005c0)) fchmodat(0xffffffffffffffff, &(0x7f00000003c0)='./file0/file0\x00', 0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee400fe43f9fc4227992749f55") 03:33:42 executing program 5: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:42 executing program 4: keyctl$set_reqkey_keyring(0x2, 0xfffffffffffffffc) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpeername$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@mcast2, @in=@remote}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001140), &(0x7f0000001180)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000011c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f00000094c0), 0x0, 0x0, &(0x7f00000096c0)={0x77359400}) getpeername$packet(0xffffffffffffffff, &(0x7f0000009700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009780)={{{@in6, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000009880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000098c0)={@local}, &(0x7f0000009900)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000009940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009980)=0x14, 0x0) accept(0xffffffffffffffff, &(0x7f00000099c0)=@can, &(0x7f0000009a40)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009c40)={{{@in=@multicast1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000009d40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000009d80)={'ip6_vti0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009dc0)={@remote}, &(0x7f0000009e00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000a300)={&(0x7f0000000300), 0xc, &(0x7f000000a2c0)={&(0x7f000000a340)=ANY=[]}}, 0x0) gettid() write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000240)={0x7}, 0x7) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) 03:33:43 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x2b}, 0x60) listen(r0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) 03:33:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={&(0x7f0000000000), 0xc, &(0x7f0000000540)={&(0x7f00000003c0)=@newlink={0x50, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_OPERSTATE={0x8}, @IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x50}}, 0x0) 03:33:43 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x800, 0x40000000000001}, 0x20) 03:33:43 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000040), 0xe) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000000)=0x25b, 0x4) 03:33:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000140)={'filter\x00', 0x7, 0x4, 0x47c, 0x0, 0x118, 0x118, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000000), {[{{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @mac=@remote, @dev, @empty, 0x2}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @multicast2, @remote}}}], {{[], 0xc0, 0xe4}, {0x24}}}}, 0x4c8) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x29, 0xfffffffffffffffe, 0x362c8f1860f11482) 03:33:43 executing program 2: getrusage(0x0, &(0x7f0000000240)) lookup_dcookie(0x0, &(0x7f0000000280)=""/61, 0x3d) clock_gettime(0x0, &(0x7f0000000500)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000007c0)}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:43 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/stat\x00') mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r2, 0x0) fstat(r1, &(0x7f0000003c80)) 03:33:43 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000040)={0x1, 0x1}) 03:33:44 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000540)={{}, 'port1\x00'}) epoll_create(0x0) syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)) set_tid_address(&(0x7f0000000040)) syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U+', 0x9f0}, 0x28, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000800)=""/79) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000140), 0xea) request_key(&(0x7f0000000600)='encrypted\x00', &(0x7f0000000640), &(0x7f0000000680)='}ppp1)wlan0\x00', 0x0) keyctl$invalidate(0x15, 0x0) prctl$intptr(0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000300)={0x0, @local, 0x0, 0x0, 'fo\x00'}, 0x2c) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000700)='trusted.overlay.origin\x00', &(0x7f0000000740)='y\x00', 0x2, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe8}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 321.594412] netlink: 'syz-executor1': attribute type 16 has an invalid length. 03:33:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'tgr160-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18}], 0x37}], 0x4924924924924b1, 0x0) 03:33:44 executing program 1: epoll_create1(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f00000009c0)='mime_type$%ppp0bdevGPLvmnet0vmnet0proc#{}trustedvmnet0\x00'}, 0x10) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000c00)=""/98) connect$unix(0xffffffffffffffff, &(0x7f0000000a40)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@remote, @in=@local}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0)) getuid() lstat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000015c0)) getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000001740)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002bc0)={{{@in6=@loopback, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000002cc0)=0xe8) stat(&(0x7f0000002d00)='./file0\x00', &(0x7f0000002d40)) gettid() lstat(&(0x7f0000002dc0)='./file0\x00', &(0x7f0000002e00)) lstat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002f40)) lstat(&(0x7f0000002f80)='./file0/file0\x00', &(0x7f0000002fc0)) fstat(0xffffffffffffffff, &(0x7f0000003040)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000030c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f00000031c0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003980), &(0x7f00000039c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000003a80)='/dev/null\x00', 0x0, 0x0) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003ac0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}}}, &(0x7f0000003bc0)=0xe8) getgid() gettid() lstat(&(0x7f0000003c00)='./file0\x00', &(0x7f0000003c40)) stat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004d00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004d40)={{{@in6=@loopback, @in=@local}}, {{}, 0x0, @in6}}, &(0x7f0000004e40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e80), &(0x7f0000004ec0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) lstat(&(0x7f0000004f40)='./file0\x00', &(0x7f0000004f80)) fstat(0xffffffffffffffff, &(0x7f0000005000)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006400)) stat(&(0x7f0000006440)='./file0/file0\x00', &(0x7f0000006480)) lstat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000065c0)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000066c0)=0xe8) getresgid(&(0x7f0000006700), &(0x7f0000006740), &(0x7f0000006780)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000067c0)) stat(&(0x7f0000006800)='./file0\x00', &(0x7f0000006840)) lstat(&(0x7f00000068c0)='./file0\x00', &(0x7f0000006900)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006980)) lstat(&(0x7f00000069c0)='./file0\x00', &(0x7f0000006a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006a80), &(0x7f0000006ac0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006b00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006b40)={{{@in6=@loopback, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000006c40)=0xe8) getresgid(&(0x7f0000006c80), &(0x7f0000006cc0), &(0x7f0000006d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006d40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006d80), &(0x7f0000006dc0)=0xc) lstat(&(0x7f0000006e00)='./file0\x00', &(0x7f0000006e40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000007180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a450f6907c44379dfb9d6adbe90dfbbd89f7f") 03:33:44 executing program 5: clock_gettime(0x4, &(0x7f0000000040)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000300)=@can, &(0x7f0000000380)=0x80) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0), 0x14) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000240)={0x20}, 0x20) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) syz_execute_func(&(0x7f00000000c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 03:33:44 executing program 4: request_key(&(0x7f0000000480)='keyring\x00', &(0x7f0000000040), 0x0, 0x0) 03:33:44 executing program 3: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x0, 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000380)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001780)=""/20, 0x14}, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001800)='/dev/sequencer2\x00', 0x0, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000005440), 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000055c0)={0xffffffffffffff9c}) 03:33:44 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='hugetlbfs\x00', 0x0, &(0x7f0000000180)) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 03:33:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000200)={r0, &(0x7f00000000c0), &(0x7f00000000c0)}, 0x20) 03:33:44 executing program 4: clock_gettime(0x1, &(0x7f00000002c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000001c0), &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000380)=@assoc_value, &(0x7f00000004c0)=0x8) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:44 executing program 2: clock_gettime(0x5, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004040)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:45 executing program 0: clock_gettime(0x6, &(0x7f00000003c0)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0x18b) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0x3e4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0x100, 0x4) sendto$inet6(r1, &(0x7f00000003c0)="040400000700000000000000fff55b4202938207d9fb3780398dad75000000007929301ee616d5c01843e06590080053c0e385472da7222a2bb42f2dbd94c3b50035060f118d0000f55dc626000095000000faffffff00000000aeb46245004bae1356642490a7b5fc88046afd77fc7ae664f65bfc370ad30c2750684ad6a7c011b677081c14445c06232055397880d89abad699a7485f036c70bbb8a784105a9cdae077", 0xa4, 0x0, &(0x7f0000000240)={0xa, 0x200800800, 0x1d, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000003580)=[{{&(0x7f0000002000)=@pppol2tpv3, 0x80, &(0x7f0000003500)=[{&(0x7f0000003440)=""/152, 0x98}], 0x1, &(0x7f0000003540)}}], 0x1, 0x0, &(0x7f0000003600)) 03:33:45 executing program 3: clock_gettime(0xfffffffffffffffe, &(0x7f0000000140)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) clock_settime(0x0, &(0x7f0000000040)={0x77359400}) recvmsg(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000340), 0x0, &(0x7f00000007c0)=""/198, 0xc6}, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000380), 0x0) getitimer(0x0, &(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000180)='net/connector\x00') getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000200)={'icmp\x00'}, &(0x7f0000000240)=0x1e) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@local}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000006c0)={@multicast1, @broadcast}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d00)={{{@in6=@dev, @in6=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002000)={&(0x7f00000001c0), 0xc, &(0x7f0000001fc0)={&(0x7f0000001e40)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:20 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000400)='.\x00', &(0x7f00000003c0)='./file0\x00') 03:33:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr=0x14280000000000, [0x18, 0x14280000000000]}, 0x10) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr, @multicast2, @loopback}, 0x28) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000200), &(0x7f00000003c0)=0x14) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000400)=0x40) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x0) 03:33:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr=0x14280000000000, [0x18, 0x14280000000000]}, 0x10) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr, @multicast2, @loopback}, 0x28) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000200), &(0x7f00000003c0)=0x14) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000400)=0x40) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x0) 03:33:20 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000400)='.\x00', &(0x7f00000003c0)='./file0\x00') 03:33:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr=0x14280000000000, [0x18, 0x14280000000000]}, 0x10) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr, @multicast2, @loopback}, 0x28) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000200), &(0x7f00000003c0)=0x14) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000400)=0x40) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x0) 03:33:20 executing program 2: getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000180)) eventfd(0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0xffffffffffffff1a, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr=0x14280000000000, [0x18, 0x14280000000000]}, 0x10) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr, @multicast2, @loopback}, 0x28) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000200), &(0x7f00000003c0)=0x14) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000400)=0x40) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x0) 03:33:20 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000400)='.\x00', &(0x7f00000003c0)='./file0\x00') 03:33:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr=0x14280000000000, [0x18, 0x14280000000000]}, 0x10) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr, @multicast2, @loopback}, 0x28) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000200), &(0x7f00000003c0)=0x14) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000400)=0x40) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x0) 03:33:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uinput\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000800)) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'bond0\x00'}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000280)={0x20}, 0x20) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@local, @dev, @multicast2}, 0xc) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000200), 0x4) symlinkat(&(0x7f0000000840)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000880)='./file1\x00') open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f00000002c0)={{0x2, 0x0, @rand_addr}, {0x0, @random="419205671896"}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6gre0\x00'}) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0xffffffffffffff8d) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@remote, @in=@broadcast}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d80)={{}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000e80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in=@loopback, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001000)={0x0, @multicast2, @multicast2}, &(0x7f0000001040)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001080)={@multicast2, @dev}, &(0x7f00000010c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001100)={'team0\x00'}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@multicast2, @local}, 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f0000000440)=0xe8) socket$inet6_sctp(0xa, 0x0, 0x84) getuid() ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000700)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000005c0)) memfd_create(&(0x7f0000001e40)='/dev/ptmx\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e80), &(0x7f00000004c0)=0xc) lstat(&(0x7f0000001f00)='./file1\x00', &(0x7f0000001f40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001fc0)) stat(&(0x7f0000002000)='./file1\x00', &(0x7f0000002040)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000020c0)) getegid() getpgrp(0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getegid() getresgid(&(0x7f0000002100), &(0x7f0000002140), &(0x7f0000002180)) sendmsg$unix(0xffffffffffffffff, &(0x7f00000022c0)={&(0x7f00000008c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001dc0), 0x0, &(0x7f0000002340)=ANY=[]}, 0x0) 03:33:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr=0x14280000000000, [0x18, 0x14280000000000]}, 0x10) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr, @multicast2, @loopback}, 0x28) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000200), &(0x7f00000003c0)=0x14) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000400)=0x40) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x0) 03:33:20 executing program 3: personality(0xffffffffffffffff) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") clock_adjtime(0x0, &(0x7f0000000200)) 03:33:20 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000400)='.\x00', &(0x7f00000003c0)='./file0\x00') 03:33:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0x1) write$cgroup_int(r1, &(0x7f0000000080)=0x3, 0x12) 03:33:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr=0x14280000000000, [0x18, 0x14280000000000]}, 0x10) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr, @multicast2, @loopback}, 0x28) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000200), &(0x7f00000003c0)=0x14) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000400)=0x40) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x0) 03:33:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0x1) write$cgroup_int(r1, &(0x7f0000000080)=0x3, 0x12) 03:33:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0x1) write$cgroup_int(r1, &(0x7f0000000080)=0x3, 0x12) 03:33:20 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000001500), 0x0, &(0x7f0000001580)={[{@statfs_percent={'statfs_percent', 0x3d, 0x80000000}}]}) 03:33:20 executing program 5: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x0, 0x0, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0636969ef69dc00d943d9c08a203637c3397c2a0f0fcd66300f1a40a5647f41c4e14d6039400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) poll(&(0x7f0000000380), 0x0, 0x0) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000003c0)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000480)=0x84) 03:33:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0x1) write$cgroup_int(r1, &(0x7f0000000080)=0x3, 0x12) 03:33:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0x1) write$cgroup_int(r1, &(0x7f0000000080)=0x3, 0x12) [ 324.181899] gfs2: statfs_percent mount option requires a numeric argument between 0 and 100 [ 324.199676] gfs2: can't parse mount arguments [ 324.270651] gfs2: statfs_percent mount option requires a numeric argument between 0 and 100 [ 324.295092] gfs2: can't parse mount arguments 03:33:20 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='securityppp0%\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a059878769ef69dc7cd9f0008f00008020c421fa7fb432322333331837c4011573d8cf0f38211ac4c10c96d9f28fc9410feefa4e2179fbe5e5c4839d0cb30080ff99e9c4010d64ac1e5d31a3b77207f0802403089f4b") 03:33:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0x1) write$cgroup_int(r1, &(0x7f0000000080)=0x3, 0x12) 03:33:21 executing program 3: semget(0xffffffffffffffff, 0x4, 0x0) msync(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) times(&(0x7f0000000080)) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f0000000040)="8f6b657972696e672f2700", 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000008c0)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000009c0)=0x84) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)={'\x00', @ifru_addrs=@can}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:33:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000300), 0x1) write$cgroup_int(r1, &(0x7f0000000080)=0x3, 0x12) 03:33:21 executing program 2: clock_getres(0xb9010000, &(0x7f0000000200)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) syslog(0x0, &(0x7f0000000240)=""/169, 0xa9) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000340)) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) eventfd(0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:21 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x29, 0x5, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(0x0, 0x0) 03:33:21 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:21 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x29, 0x5, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(0x0, 0x0) 03:33:21 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0xa, &(0x7f0000000180)={@in6={0xa, 0x0, 0x0, @mcast1}, {&(0x7f0000000000)=""/119, 0x77}, &(0x7f0000000080)}, 0xa0) 03:33:21 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:21 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x29, 0x5, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(0x0, 0x0) 03:33:21 executing program 5: eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000840)=ANY=[], 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0), 0xc, &(0x7f0000000200)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000140), 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) getpgrp(0xffffffffffffffff) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) getpgid(0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) 03:33:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffff9c, &(0x7f0000008cc0), 0x0, 0x0, &(0x7f0000008f00)={0x0, 0x1c9c380}) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f0000008f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300), 0xe) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000005c0)='trusted.overlay.opaque\x00', &(0x7f0000000600)='y\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000008f80)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f00000003c0)}}}) pipe2(&(0x7f0000000080), 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000240)) syz_open_dev$admmidi(&(0x7f0000000680)='/dev/admmidi#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000200)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000180)='bridge0\x00') syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") 03:33:21 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:21 executing program 3: semget(0xffffffffffffffff, 0x4, 0x0) msync(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) times(&(0x7f0000000080)) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f0000000040)="8f6b657972696e672f2700", 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000008c0)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000009c0)=0x84) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)={'\x00', @ifru_addrs=@can}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:33:21 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x29, 0x5, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(0x0, 0x0) 03:33:22 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:22 executing program 2: clock_getres(0xb9010000, &(0x7f0000000200)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) syslog(0x0, &(0x7f0000000240)=""/169, 0xa9) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000340)) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) eventfd(0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:22 executing program 4: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f0000000180)=""/96) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:33:22 executing program 1: clock_gettime(0x2, &(0x7f0000001100)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getgroups(0x0, &(0x7f0000000c80)) lstat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000e00)) getgid() getgid() getresgid(&(0x7f0000000d80), &(0x7f0000000e80), &(0x7f0000000ec0)) fstat(0xffffffffffffffff, &(0x7f0000000f00)) getgroups(0x0, &(0x7f0000000f80)) stat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) setxattr$system_posix_acl(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='system.posix_acl_access\x00', &(0x7f0000001080), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000400)) pipe(&(0x7f0000000080)) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000240)) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x244) dup(0xffffffffffffffff) request_key(&(0x7f0000000480)="e762f05c6b6579726901000100958b4e90f2892c0523c92727d74e3d6e6700", &(0x7f00000000c0), &(0x7f0000000440)='\x00', 0xfffffffffffffffa) request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200), &(0x7f0000000280)='notify_on_release\x00', 0x0) keyctl$unlink(0x9, 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1a0f1808e29866450ff61f7f") 03:33:22 executing program 4: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f0000000180)=""/96) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:33:22 executing program 5: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000580)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), 0x4) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000080)={0xfffffffffffffffb, 0x20}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:33:22 executing program 4: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f0000000180)=""/96) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:33:22 executing program 3: semget(0xffffffffffffffff, 0x4, 0x0) msync(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) times(&(0x7f0000000080)) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f0000000040)="8f6b657972696e672f2700", 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000008c0)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000009c0)=0x84) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)={'\x00', @ifru_addrs=@can}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:33:22 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc1105511, &(0x7f0000000280)={0xb, 0x0, 0x0, 0x0, &(0x7f0000000100)}) 03:33:22 executing program 2: clock_getres(0xb9010000, &(0x7f0000000200)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) syslog(0x0, &(0x7f0000000240)=""/169, 0xa9) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000340)) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) eventfd(0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:23 executing program 5: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000580)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), 0x4) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000080)={0xfffffffffffffffb, 0x20}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:33:23 executing program 4: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f0000000180)=""/96) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040)=0x4, 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:33:23 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000580)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), 0x4) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000080)={0xfffffffffffffffb, 0x20}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:33:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0xa9, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000003c0)=""/128}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f00000002c0)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x7fffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000002100)) 03:33:23 executing program 4: shmget(0x2, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) eventfd(0x0) fchdir(0xffffffffffffffff) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14, 0x0) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_addrs=@hci}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000bc0)={@dev, @broadcast}, &(0x7f0000000c00)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000008c00), 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008d40)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000008e40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000008e80)={{{@in=@broadcast, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000008f80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000009280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000092c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009300), &(0x7f0000009340)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f000000bac0), 0x0, 0x0, &(0x7f000000bb40)={0x77359400}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000bd80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bdc0)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f000000be00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000be40)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0xa9, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000003c0)=""/128}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f00000002c0)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x7fffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000002100)) 03:33:23 executing program 5: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000580)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), 0x4) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000080)={0xfffffffffffffffb, 0x20}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:33:23 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000580)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), 0x4) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000080)={0xfffffffffffffffb, 0x20}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:33:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0xa9, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000003c0)=""/128}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f00000002c0)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x7fffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000002100)) 03:33:23 executing program 3: semget(0xffffffffffffffff, 0x4, 0x0) msync(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) times(&(0x7f0000000080)) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f0000000040)="8f6b657972696e672f2700", 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000008c0)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000009c0)=0x84) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)={'\x00', @ifru_addrs=@can}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:33:23 executing program 2: clock_getres(0xb9010000, &(0x7f0000000200)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) syslog(0x0, &(0x7f0000000240)=""/169, 0xa9) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000340)) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) eventfd(0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000000c0)}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0xa9, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000003c0)=""/128}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f00000002c0)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x7fffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000002100)) 03:33:24 executing program 5: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000580)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), 0x4) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000080)={0xfffffffffffffffb, 0x20}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:33:24 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000580)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), 0x4) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000080)={0xfffffffffffffffb, 0x20}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 03:33:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0xa9, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000003c0)=""/128}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f00000002c0)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x7fffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000002100)) 03:33:24 executing program 4: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000680)={'bcsf0\x00'}) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) openat$null(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/null\x00', 0x0, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000800), 0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000300)) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @remote}, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000340)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000003c0)) getpgrp(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={{}, {0x77359400}}) 03:33:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0xa9, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000003c0)=""/128}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f00000002c0)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x7fffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000002100)) 03:33:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0xffffffffffffffd6, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = socket$inet(0x10, 0x3, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='yeah\x00', 0x5) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 03:33:24 executing program 3: keyctl$set_reqkey_keyring(0x10, 0x10000) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@loopback, @multicast1}, &(0x7f0000000400)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={@ipv4={[], [], @remote}}, 0x14) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x9, 0x3, 0x278, 0x150, 0x0, 0x0, 0x0, 0x150, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, &(0x7f0000000100), {[{{@ip={@local, @remote, 0x0, 0x0, 'veth0\x00', 'ip6gretap0\x00'}, 0x0, 0x98, 0x100}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz1\x00'}}}, {{@ip={@dev, @loopback, 0x0, 0x0, 'eql\x00', 'bridge_slave_0\x00'}, 0x0, 0x98, 0xe0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@loopback, 'erspan0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d8) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) 03:33:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0xa9, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000003c0)=""/128}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f00000002c0)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x7fffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000002100)) [ 328.446559] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:33:24 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x77359400}) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000002c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in=@multicast1, @in6=@loopback}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000440)=@can, &(0x7f0000000500)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000580)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a80)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in=@broadcast, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000780)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000800)=0x14, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000880), 0x0, 0x0, &(0x7f0000000a00)=@sco, 0x80) getpeername$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000009c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b40)={0x0, @local, @loopback}, &(0x7f0000000b80)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f00000011c0), 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@mcast2, @in=@multicast1}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000001480)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001840), &(0x7f0000001880)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000004080), 0x0, 0x0, &(0x7f0000004240)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004340)={0x0, @local}, &(0x7f0000004380)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004480)={{{@in6=@mcast1, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000004580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:33:24 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x720000, 0x3f}) [ 328.711117] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:33:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r1, &(0x7f0000000180)=[{&(0x7f0000000000)=""/7, 0x7}], 0x1) ioctl$int_in(r1, 0x800000800c5011, &(0x7f0000000040)) [ 328.760689] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:33:25 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x720000, 0x3f}) [ 328.905554] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:33:25 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x720000, 0x3f}) [ 329.036761] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:33:25 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x720000, 0x3f}) 03:33:25 executing program 4: getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000400)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") [ 329.160545] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 03:33:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0xffffffffffffffd6, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = socket$inet(0x10, 0x3, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='yeah\x00', 0x5) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 03:33:25 executing program 0: r0 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000340)=0x60) ioctl$sock_ifreq(r0, 0x8920, &(0x7f0000000380)={'veth0_to_team\x00', @ifru_hwaddr=@remote}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0xb8) socketpair(0x11, 0x800, 0x6, &(0x7f00000003c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4003) ioctl$VT_GETMODE(r4, 0x5601, &(0x7f0000000240)) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x800000000000023) clock_gettime(0x7, &(0x7f0000000400)) signalfd4(r1, &(0x7f0000000100)={0xfffffffffffffffe}, 0x8, 0x800) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000840)) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f0000000440)={"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"}) [ 329.333211] sched: DL replenish lagged too much [ 329.382664] IPVS: ftp: loaded support on port[0] = 21 03:33:25 executing program 3: getresuid(&(0x7f0000001a40), &(0x7f0000001a00), &(0x7f00000001c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000940)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000080), &(0x7f0000000480)=ANY=[]}, 0x78) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000600)=@assoc_value, &(0x7f0000000f80)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000002c0), &(0x7f00000003c0), &(0x7f00000006c0)) munlockall() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000140), &(0x7f0000000180)=0x4) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000010c0)={{{@in6=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xffffffffffffffbc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'gretap0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@mcast1, @in6}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000d80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001640)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@loopback, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001d00)={@dev, @dev}, &(0x7f0000001d40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@loopback, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001ec0)={{{@in=@loopback, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000001fc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002000)={@dev, @multicast1}, &(0x7f0000002040)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000002680)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000026c0)={0x0, @empty, @loopback}, &(0x7f0000002700)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002740)={0x0, @loopback, @broadcast}, &(0x7f0000002780)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000027c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002800)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002880)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002a80)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002ac0), &(0x7f0000002b00)=0x14) accept4(0xffffffffffffffff, &(0x7f0000002b40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002bc0)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000058c0)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005900)={@dev}, &(0x7f0000005940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000005980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000059c0)=0xfffffffffffffda6) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000006c40)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000007640)={&(0x7f0000000680), 0xc, &(0x7f0000007600)={&(0x7f0000006c80)={0x14}, 0x14}}, 0x0) fstat(0xffffffffffffffff, &(0x7f00000008c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a80), &(0x7f0000000800)=0xc) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000540)={0x90}, 0x90) [ 329.504779] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:33:25 executing program 2: epoll_create1(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:25 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)="2e0600000000000000c87adc0000", 0x1ff) eventfd2(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) dup(0xffffffffffffffff) keyctl$dh_compute(0xe, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") [ 329.750134] IPVS: ftp: loaded support on port[0] = 21 03:33:26 executing program 0: r0 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000340)=0x60) ioctl$sock_ifreq(r0, 0x8920, &(0x7f0000000380)={'veth0_to_team\x00', @ifru_hwaddr=@remote}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0xb8) socketpair(0x11, 0x800, 0x6, &(0x7f00000003c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4003) ioctl$VT_GETMODE(r4, 0x5601, &(0x7f0000000240)) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x800000000000023) clock_gettime(0x7, &(0x7f0000000400)) signalfd4(r1, &(0x7f0000000100)={0xfffffffffffffffe}, 0x8, 0x800) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000840)) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f0000000440)={"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"}) [ 330.073622] IPVS: ftp: loaded support on port[0] = 21 03:33:26 executing program 4: mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=""/152, 0x98) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000480), 0x8) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'tunl0\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") recvmmsg(0xffffffffffffffff, &(0x7f00000088c0), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000003840), 0x0, 0x0) 03:33:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0xffffffffffffffd6, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = socket$inet(0x10, 0x3, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='yeah\x00', 0x5) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 03:33:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000640)}) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000001c0)={{}, 'syz0\x00'}) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f0000000840)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") accept(0xffffffffffffff9c, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') setrlimit(0x0, &(0x7f0000000240)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@local, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0xfffffffffffffc98) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000740)={0x0, @loopback, @local}, &(0x7f0000000780)=0xc) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@known='trusted.overlay.metacopy\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000800)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'ip6_vti0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000980)={@dev, @rand_addr}, &(0x7f0000000940)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000340)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b00)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) socket$inet6(0xa, 0x0, 0x0) dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 03:33:26 executing program 0: r0 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000340)=0x60) ioctl$sock_ifreq(r0, 0x8920, &(0x7f0000000380)={'veth0_to_team\x00', @ifru_hwaddr=@remote}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0xb8) socketpair(0x11, 0x800, 0x6, &(0x7f00000003c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4003) ioctl$VT_GETMODE(r4, 0x5601, &(0x7f0000000240)) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x800000000000023) clock_gettime(0x7, &(0x7f0000000400)) signalfd4(r1, &(0x7f0000000100)={0xfffffffffffffffe}, 0x8, 0x800) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000840)) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f0000000440)={"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"}) [ 330.556948] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 330.723897] IPVS: ftp: loaded support on port[0] = 21 03:33:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000080)=@ethtool_rxfh_indir={0x6}}) 03:33:27 executing program 2: prctl$intptr(0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000006c0)={0x0, @in6}, &(0x7f0000000780)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000007c0), &(0x7f0000000880)=0x8) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') getsockname$inet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000500)=0x10) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) gettid() ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000540), 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000580), &(0x7f00000005c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000600), &(0x7f0000000640)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) 03:33:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0x20) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) unshare(0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getegid() 03:33:27 executing program 0: r0 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f0000000340)=0x60) ioctl$sock_ifreq(r0, 0x8920, &(0x7f0000000380)={'veth0_to_team\x00', @ifru_hwaddr=@remote}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0xb8) socketpair(0x11, 0x800, 0x6, &(0x7f00000003c0)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4003) ioctl$VT_GETMODE(r4, 0x5601, &(0x7f0000000240)) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x800000000000023) clock_gettime(0x7, &(0x7f0000000400)) signalfd4(r1, &(0x7f0000000100)={0xfffffffffffffffe}, 0x8, 0x800) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000840)) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f0000000440)={"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"}) 03:33:27 executing program 4: mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=""/152, 0x98) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000480), 0x8) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'tunl0\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") recvmmsg(0xffffffffffffffff, &(0x7f00000088c0), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000003840), 0x0, 0x0) [ 331.364701] IPVS: ftp: loaded support on port[0] = 21 03:33:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0xffffffffffffffd6, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = socket$inet(0x10, 0x3, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='yeah\x00', 0x5) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 03:33:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="14928e474c"], 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x141602, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 331.765032] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:33:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="14928e474c"], 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x141602, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:33:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="14928e474c"], 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x141602, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:33:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001400)={&(0x7f00000001c0), 0xc, &(0x7f00000013c0)={&(0x7f0000000200)=@ipv6_getanyicast={0x14, 0x12, 0x105}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000003780)=[{{&(0x7f0000000640)=@xdp, 0x80, &(0x7f0000000780)=[{&(0x7f00000006c0)=""/144, 0x90}, {&(0x7f0000001440)=""/4096, 0x1000}], 0x2, &(0x7f00000007c0)=""/183, 0xb7}}], 0x1, 0x0, 0x0) [ 332.110131] syz-executor1 (9543) used greatest stack depth: 13176 bytes left 03:33:28 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000001c0), &(0x7f0000000740)=0x4) clone(0x4, &(0x7f0000000280)="0d6da42101d5e16edf91a2c1a8df594bd366505bf7e00430a451288991283e8a722a7f1736aff3e23bda1780bad32f410bea441f631445d65156691e0aaa846a58818034a89b6676b1d5a7c9d254b40c2ba62a4eb559c1ebc04fffee7969c9e4a32a24e7000000003e2d388a360c06a814789d2422cb701e6fd542c3bed99f6f3634108b898bb96733dfa4075f65d1510b46f8899d7081406ecbd24c58a5625a1fcbe0a4f47b710ca46518bc5e56ffe7c9e3d6aa375243891fbcd540dbb9571b95d03ca18cca8b0c", &(0x7f0000000100), &(0x7f00000000c0), &(0x7f0000000140)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000007c0)=r2) r3 = syz_open_dev$vcsa(&(0x7f0000000800)='/dev/vcsa#\x00', 0x3a8, 0x400000) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000400)={r1}) setsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000440)={0x0, 0x0, 0x1, 0x0, 0x9, 0x3f, 0x0, 0x0, 0x0, 0x8000, 0x1f}, 0xb) finit_module(r0, &(0x7f0000000140)='\'+[keyringeth0@vboxnet0{userselfcgroup+trustedGPL\x00', 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) set_tid_address(&(0x7f00000003c0)) accept$unix(r4, &(0x7f0000000200)=@abs, &(0x7f0000000780)=0x6e) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e21}}, 0x0, 0x0, 0x0, 0x262, 0x7}, &(0x7f0000000540)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000580)={0x4122d220, 0x9, 0x0, 0x9}, &(0x7f0000000680)=0x10) ioctl$TIOCCBRK(r3, 0x5428) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$TIOCMBIC(r3, 0x5417, &(0x7f0000000840)=0x8) ioctl$KVM_SET_DEBUGREGS(r5, 0x4080aea2, &(0x7f00000006c0)={[0x0, 0x0, 0x0, 0x1f000], 0xffffffff, 0x2, 0x7a}) openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x400, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000380)={0x7, 0x15, 0x2}, 0x7) 03:33:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0x20) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) unshare(0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getegid() 03:33:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="14928e474c"], 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x141602, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:33:28 executing program 4: mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=""/152, 0x98) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000480), 0x8) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'tunl0\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") recvmmsg(0xffffffffffffffff, &(0x7f00000088c0), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000003840), 0x0, 0x0) 03:33:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0x20) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) unshare(0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getegid() 03:33:28 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000001c0), &(0x7f0000000740)=0x4) clone(0x4, &(0x7f0000000280)="0d6da42101d5e16edf91a2c1a8df594bd366505bf7e00430a451288991283e8a722a7f1736aff3e23bda1780bad32f410bea441f631445d65156691e0aaa846a58818034a89b6676b1d5a7c9d254b40c2ba62a4eb559c1ebc04fffee7969c9e4a32a24e7000000003e2d388a360c06a814789d2422cb701e6fd542c3bed99f6f3634108b898bb96733dfa4075f65d1510b46f8899d7081406ecbd24c58a5625a1fcbe0a4f47b710ca46518bc5e56ffe7c9e3d6aa375243891fbcd540dbb9571b95d03ca18cca8b0c", &(0x7f0000000100), &(0x7f00000000c0), &(0x7f0000000140)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000007c0)=r2) r3 = syz_open_dev$vcsa(&(0x7f0000000800)='/dev/vcsa#\x00', 0x3a8, 0x400000) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000400)={r1}) setsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000440)={0x0, 0x0, 0x1, 0x0, 0x9, 0x3f, 0x0, 0x0, 0x0, 0x8000, 0x1f}, 0xb) finit_module(r0, &(0x7f0000000140)='\'+[keyringeth0@vboxnet0{userselfcgroup+trustedGPL\x00', 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) set_tid_address(&(0x7f00000003c0)) accept$unix(r4, &(0x7f0000000200)=@abs, &(0x7f0000000780)=0x6e) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e21}}, 0x0, 0x0, 0x0, 0x262, 0x7}, &(0x7f0000000540)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000580)={0x4122d220, 0x9, 0x0, 0x9}, &(0x7f0000000680)=0x10) ioctl$TIOCCBRK(r3, 0x5428) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$TIOCMBIC(r3, 0x5417, &(0x7f0000000840)=0x8) ioctl$KVM_SET_DEBUGREGS(r5, 0x4080aea2, &(0x7f00000006c0)={[0x0, 0x0, 0x0, 0x1f000], 0xffffffff, 0x2, 0x7a}) openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x400, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000380)={0x7, 0x15, 0x2}, 0x7) 03:33:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="14928e474c"], 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x141602, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:33:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="14928e474c"], 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x141602, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:33:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0x20) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) unshare(0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getegid() [ 333.000669] syz-executor5 (9590) used greatest stack depth: 13080 bytes left 03:33:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0x20) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) unshare(0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getegid() 03:33:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="14928e474c"], 0x5) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x141602, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:33:29 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000001c0), &(0x7f0000000740)=0x4) clone(0x4, &(0x7f0000000280)="0d6da42101d5e16edf91a2c1a8df594bd366505bf7e00430a451288991283e8a722a7f1736aff3e23bda1780bad32f410bea441f631445d65156691e0aaa846a58818034a89b6676b1d5a7c9d254b40c2ba62a4eb559c1ebc04fffee7969c9e4a32a24e7000000003e2d388a360c06a814789d2422cb701e6fd542c3bed99f6f3634108b898bb96733dfa4075f65d1510b46f8899d7081406ecbd24c58a5625a1fcbe0a4f47b710ca46518bc5e56ffe7c9e3d6aa375243891fbcd540dbb9571b95d03ca18cca8b0c", &(0x7f0000000100), &(0x7f00000000c0), &(0x7f0000000140)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000007c0)=r2) r3 = syz_open_dev$vcsa(&(0x7f0000000800)='/dev/vcsa#\x00', 0x3a8, 0x400000) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000400)={r1}) setsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000440)={0x0, 0x0, 0x1, 0x0, 0x9, 0x3f, 0x0, 0x0, 0x0, 0x8000, 0x1f}, 0xb) finit_module(r0, &(0x7f0000000140)='\'+[keyringeth0@vboxnet0{userselfcgroup+trustedGPL\x00', 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) set_tid_address(&(0x7f00000003c0)) accept$unix(r4, &(0x7f0000000200)=@abs, &(0x7f0000000780)=0x6e) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e21}}, 0x0, 0x0, 0x0, 0x262, 0x7}, &(0x7f0000000540)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000580)={0x4122d220, 0x9, 0x0, 0x9}, &(0x7f0000000680)=0x10) ioctl$TIOCCBRK(r3, 0x5428) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$TIOCMBIC(r3, 0x5417, &(0x7f0000000840)=0x8) ioctl$KVM_SET_DEBUGREGS(r5, 0x4080aea2, &(0x7f00000006c0)={[0x0, 0x0, 0x0, 0x1f000], 0xffffffff, 0x2, 0x7a}) openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x400, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000380)={0x7, 0x15, 0x2}, 0x7) 03:33:29 executing program 4: mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=""/152, 0x98) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000480), 0x8) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'tunl0\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") recvmmsg(0xffffffffffffffff, &(0x7f00000088c0), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000003840), 0x0, 0x0) 03:33:29 executing program 3: unshare(0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000140)='mime_type\x00', 0xffffffffffffffff) keyctl$setperm(0x5, 0x0, 0x0) socketpair$inet(0x2, 0x0, 0x800000, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000480), 0x4) io_setup(0x0, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)}, &(0x7f0000000400)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, @loopback}, 0x1c) gettid() syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 03:33:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0x20) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) unshare(0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getegid() 03:33:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20}, 0x20) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) unshare(0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getegid() 03:33:30 executing program 2: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) rt_sigpending(&(0x7f0000000080), 0x8) io_setup(0x0, &(0x7f0000000240)) signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) ustat(0x0, &(0x7f0000000780)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000480)) rt_sigaction(0x0, &(0x7f0000000140)={&(0x7f0000000040)="4276c8c461fc576fc08fe9a893e9c402d0f34b756745ccf242aed30dfeefffff36e300dacb660f1bb008000000", {}, 0x0, &(0x7f00000000c0)="c443d148a38d000000fe2626660f62e2c4c201397f056426c065000ec462a99be8366536de494bc481a25d670fc4416de4b800000000660f38dbe726430f6be1"}, 0x0, 0x8, &(0x7f0000000180)) request_key(&(0x7f0000000300)='encrypted\x00', &(0x7f0000000340), &(0x7f00000003c0)='.\x00', 0xfffffffffffffffd) connect(0xffffffffffffffff, &(0x7f00000004c0)=@nl=@unspec, 0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:30 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000001c0), &(0x7f0000000740)=0x4) clone(0x4, &(0x7f0000000280)="0d6da42101d5e16edf91a2c1a8df594bd366505bf7e00430a451288991283e8a722a7f1736aff3e23bda1780bad32f410bea441f631445d65156691e0aaa846a58818034a89b6676b1d5a7c9d254b40c2ba62a4eb559c1ebc04fffee7969c9e4a32a24e7000000003e2d388a360c06a814789d2422cb701e6fd542c3bed99f6f3634108b898bb96733dfa4075f65d1510b46f8899d7081406ecbd24c58a5625a1fcbe0a4f47b710ca46518bc5e56ffe7c9e3d6aa375243891fbcd540dbb9571b95d03ca18cca8b0c", &(0x7f0000000100), &(0x7f00000000c0), &(0x7f0000000140)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000007c0)=r2) r3 = syz_open_dev$vcsa(&(0x7f0000000800)='/dev/vcsa#\x00', 0x3a8, 0x400000) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000400)={r1}) setsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000440)={0x0, 0x0, 0x1, 0x0, 0x9, 0x3f, 0x0, 0x0, 0x0, 0x8000, 0x1f}, 0xb) finit_module(r0, &(0x7f0000000140)='\'+[keyringeth0@vboxnet0{userselfcgroup+trustedGPL\x00', 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) set_tid_address(&(0x7f00000003c0)) accept$unix(r4, &(0x7f0000000200)=@abs, &(0x7f0000000780)=0x6e) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e21}}, 0x0, 0x0, 0x0, 0x262, 0x7}, &(0x7f0000000540)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000580)={0x4122d220, 0x9, 0x0, 0x9}, &(0x7f0000000680)=0x10) ioctl$TIOCCBRK(r3, 0x5428) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$TIOCMBIC(r3, 0x5417, &(0x7f0000000840)=0x8) ioctl$KVM_SET_DEBUGREGS(r5, 0x4080aea2, &(0x7f00000006c0)={[0x0, 0x0, 0x0, 0x1f000], 0xffffffff, 0x2, 0x7a}) openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x400, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000380)={0x7, 0x15, 0x2}, 0x7) 03:33:30 executing program 5: r0 = socket(0x10, 0x80002, 0x2) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000e8f000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[]}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:33:30 executing program 4: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x68, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @dev}, @in6, @in={0x2, 0x0, @dev}, @in={0x2, 0x0, @rand_addr}, @in={0x2, 0x0, @rand_addr}]}, &(0x7f0000000100)=0x10) write(r0, &(0x7f0000000140)="150000000000080083a66dd2c86b6525000010", 0x13) 03:33:31 executing program 3: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) geteuid() getegid() getpgid(0xffffffffffffffff) geteuid() fstat(0xffffffffffffff9c, &(0x7f0000000b00)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001e00)) stat(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)) fstat(0xffffffffffffffff, &(0x7f0000001f00)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001f80)) syz_open_pts(0xffffffffffffff9c, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000001fc0)='/dev/userio\x00', 0x0, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000002000)) openat$kvm(0xffffffffffffff9c, &(0x7f0000002040)='/dev/kvm\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) inotify_init() openat$nullb(0xffffffffffffff9c, &(0x7f0000002080)='/dev/nullb0\x00', 0x0, 0x0) gettid() fstat(0xffffffffffffff9c, &(0x7f00000020c0)) getgid() getpgrp(0xffffffffffffffff) stat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)) lstat(&(0x7f0000002840)='./file0\x00', &(0x7f0000003040)) perf_event_open$cgroup(&(0x7f0000002740)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002880)={0xffffffffffffffff}, 0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002240)="63707561636310e675738c3fe9ac4ad932be00", 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) getpgrp(0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000002b00)) getegid() 03:33:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=ANY=[@ANYBLOB="850000002200000007000000005dde009500000000000000"], &(0x7f0000014ff5)="73797a6b610000000500f3", 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x3a, 0x9d, &(0x7f0000000000)="e460019234060dc106621abc86dd6a00000000072feb305660319056115082553800800000000000e8d500000001000000140000000000006558", &(0x7f000001df63)=""/157}, 0x28) 03:33:31 executing program 0: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000100)=""/126, &(0x7f0000000180)=0x7e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x69, 0x0) 03:33:31 executing program 0: prctl$setname(0x1b, &(0x7f00000003c0)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f0000000180)) openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) getuid() setreuid(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000000c0)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000140)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000540)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000440), 0x5c) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000500)) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:31 executing program 5: clock_gettime(0x1, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) getsockname(0xffffffffffffffff, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000003c0)=0x80) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000e00), 0x4) accept$packet(0xffffffffffffffff, &(0x7f0000003080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000030c0)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000003100)={@mcast1, @mcast1, @ipv4={[], [], @rand_addr}}) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f18ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") syz_genetlink_get_family_id$ipvs(&(0x7f0000000840)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000480), 0xc, &(0x7f0000000880)={&(0x7f0000000a40)=ANY=[]}}, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000500)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000040)}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@remote, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f00000008c0)=0xaa) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001000)={{{@in=@loopback, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000001100)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c80)={{{@in6=@remote, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000001240)=0x139) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001280)={'team0\x00'}) lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000012c0)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000006fc0), 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000045c0)={&(0x7f0000000400), 0xc, &(0x7f0000004580)={&(0x7f0000004280)=ANY=[]}}, 0x0) socket$inet6(0xa, 0x0, 0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000007c0)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 03:33:31 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000001c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) 03:33:31 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000240)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000440)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) getegid() ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000280)) pipe(&(0x7f00000002c0)) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) clock_gettime(0x0, &(0x7f0000000500)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) 03:33:31 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) r2 = dup(r1) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00002eaffc)=0x101, 0x4) connect$inet(r1, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) sendto$inet(r2, &(0x7f0000000200)="96", 0x1, 0x3fff, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000004bc0)={&(0x7f0000000000), 0xc, &(0x7f0000004b80)={&(0x7f0000000880)=ANY=[@ANYBLOB], 0x1}}, 0x0) socket$inet6(0xa, 0x0, 0x0) preadv(r0, &(0x7f0000000bc0)=[{&(0x7f00000007c0)=""/165, 0xa5}, {&(0x7f0000000880)=""/26, 0x1a}, {&(0x7f00000008c0)=""/185, 0xb9}, {&(0x7f0000000980)=""/227, 0xe3}, {&(0x7f0000000b40)=""/74, 0x4a}], 0x5, 0x0) sendto$inet(r2, &(0x7f0000000100)="89", 0x1, 0x3fffffd, &(0x7f00000001c0)={0x2, 0x0, @dev}, 0x10) write$vnet(r2, &(0x7f0000000580)={0x1, {&(0x7f0000000480)=""/202, 0x3d6, &(0x7f0000000380)=""/252}}, 0xfffffdef) 03:33:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) unshare(0x28020400) getsockname$packet(r0, &(0x7f0000000080), &(0x7f0000000040)=0xfe5d) 03:33:31 executing program 3: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb}, 0x2c) [ 335.690902] capability: warning: `syz-executor3' uses 32-bit capabilities (legacy support in use) 03:33:32 executing program 4: memfd_create(&(0x7f0000000340)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00', 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000140)) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, &(0x7f0000000480)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, "5670008fd1e7bf9a3151396ca466f5ccda828b834a1d3cf78e20e61196d3cfc8ba5b6d37ea8e7470b7cfd5f73e57dcb83950e80737dd73133ecfbd8715de12950d5845227d77f913dc0b8ba18c273de2615301ecb0b91701abddd27e9189333d228626d9f175506be6e7471cfd1778c30a98e8c6256fbb9c19a0e193a370eb37"}) ftruncate(0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000080)={0x77359400}, 0x10) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000380)={@loopback}, 0x14) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f00000001c0), 0x0) syz_emit_ethernet(0x0, &(0x7f0000000480)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000), 0x4) 03:33:32 executing program 3: syz_extract_tcp_res(&(0x7f0000000100), 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000280)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="ff"]], 0x0, 0x0, &(0x7f0000000340)}) [ 335.904639] binder: 9708:9709 unknown command 536871040 [ 335.910093] binder: 9708:9709 ioctl c0306201 200003c0 returned -22 [ 335.956984] binder: 9708:9711 unknown command 536871040 [ 335.962436] binder: 9708:9711 ioctl c0306201 200003c0 returned -22 03:33:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, "10dec303415fe113b503cf1ae12551c61445c12e013d036d8beab09fd20f016238cbff4c48bedba30ba150f670d88ebe0a077b1bb29ee38b71b3515ce4ec8200", "c3174cfe994a2869e5662e1e2a72e0fb4aee287df2df380b95e5b25a31c8f999938bfe8bf214ff8e583ea7b0e03ff510bcddd4757451a798594da244e721450c", "a2b98fba2b259731fba7132ce30a6db82958009e4ff06da85422d63bc7d0db26"}) 03:33:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000)={0x0, 0x1, 0xfffffffffffffffc}, 0x4) syz_emit_ethernet(0x36, &(0x7f0000c22000)={@random="9a52438e8227", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x23a, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @icmp=@timestamp}}}}, &(0x7f0000ea3000)) 03:33:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0xa00, [0x20000140, 0x0, 0x0, 0x20000ae0, 0x20000b10], 0x0, &(0x7f0000000000), &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'bond_slave_0\x00', 'gre0\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @remote, [], @local, [], 0x900, 0x938, 0x970, [@among={'among\x00', 0x868, {{0x378, 0x0, 0x0, {[], 0x5, [{[], @dev}, {[], @dev}, {[], @multicast2}, {[], @remote}, {[], @multicast2}]}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff80000001], 0x1, [{[], @rand_addr}]}}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@random="c738df725464"}}}]}, @snat={'snat\x00', 0x10, {{@broadcast}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0xa78) 03:33:32 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = dup2(r0, r0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) bind$unix(r1, &(0x7f0000000140)=@abs, 0x6e) 03:33:32 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) r2 = dup(r1) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00002eaffc)=0x101, 0x4) connect$inet(r1, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) sendto$inet(r2, &(0x7f0000000200)="96", 0x1, 0x3fff, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000004bc0)={&(0x7f0000000000), 0xc, &(0x7f0000004b80)={&(0x7f0000000880)=ANY=[@ANYBLOB], 0x1}}, 0x0) socket$inet6(0xa, 0x0, 0x0) preadv(r0, &(0x7f0000000bc0)=[{&(0x7f00000007c0)=""/165, 0xa5}, {&(0x7f0000000880)=""/26, 0x1a}, {&(0x7f00000008c0)=""/185, 0xb9}, {&(0x7f0000000980)=""/227, 0xe3}, {&(0x7f0000000b40)=""/74, 0x4a}], 0x5, 0x0) sendto$inet(r2, &(0x7f0000000100)="89", 0x1, 0x3fffffd, &(0x7f00000001c0)={0x2, 0x0, @dev}, 0x10) write$vnet(r2, &(0x7f0000000580)={0x1, {&(0x7f0000000480)=""/202, 0x3d6, &(0x7f0000000380)=""/252}}, 0xfffffdef) 03:33:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, "10dec303415fe113b503cf1ae12551c61445c12e013d036d8beab09fd20f016238cbff4c48bedba30ba150f670d88ebe0a077b1bb29ee38b71b3515ce4ec8200", "c3174cfe994a2869e5662e1e2a72e0fb4aee287df2df380b95e5b25a31c8f999938bfe8bf214ff8e583ea7b0e03ff510bcddd4757451a798594da244e721450c", "a2b98fba2b259731fba7132ce30a6db82958009e4ff06da85422d63bc7d0db26"}) 03:33:32 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) r2 = dup(r1) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00002eaffc)=0x101, 0x4) connect$inet(r1, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) sendto$inet(r2, &(0x7f0000000200)="96", 0x1, 0x3fff, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000004bc0)={&(0x7f0000000000), 0xc, &(0x7f0000004b80)={&(0x7f0000000880)=ANY=[@ANYBLOB], 0x1}}, 0x0) socket$inet6(0xa, 0x0, 0x0) preadv(r0, &(0x7f0000000bc0)=[{&(0x7f00000007c0)=""/165, 0xa5}, {&(0x7f0000000880)=""/26, 0x1a}, {&(0x7f00000008c0)=""/185, 0xb9}, {&(0x7f0000000980)=""/227, 0xe3}, {&(0x7f0000000b40)=""/74, 0x4a}], 0x5, 0x0) sendto$inet(r2, &(0x7f0000000100)="89", 0x1, 0x3fffffd, &(0x7f00000001c0)={0x2, 0x0, @dev}, 0x10) write$vnet(r2, &(0x7f0000000580)={0x1, {&(0x7f0000000480)=""/202, 0x3d6, &(0x7f0000000380)=""/252}}, 0xfffffdef) 03:33:32 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x4, 0x210, [0x20000240, 0x0, 0x0, 0x20000350, 0x200005a0], 0x0, &(0x7f0000000040), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x19, 0x8, 0x2, 'ip6tnl0\x00', 'lo\x00', 'ip6gre0\x00', 'eql\x00', @dev={[], 0x11}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="aebe11c9273a", 0xfffffffffffffffe}}}]}, @arpreply={'arpreply\x00', 0x10, {{@remote, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x0, 0x2, 0xd, 'veth0_to_bridge\x00', 'bcsf0\x00', 'rose0\x00', 'ip6tnl0\x00', @dev={[], 0x1a}, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x0, 0x0, 0x0, 0xff, 0xff], 0x70, 0x70, 0xa0}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x3}]}, 0x288) 03:33:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000780)="aefdd9f9deb535a7497880198acaaf0035ddc99b9db584355703dbb940e97c", 0x1f, 0x10000}], 0x2000, &(0x7f0000000880)={[{@umask={'umask', 0x3d, 0x4}}, {@dmask={'dmask', 0x3d, 0x73}}]}) r2 = socket(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="0a5cc8070031") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x82002, 0x0) write$sndseq(r3, &(0x7f00000003c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @control={0x0, 0x5}}], 0x30) r4 = dup2(r2, r3) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getsockopt$sock_int(r4, 0x1, 0x20, &(0x7f0000000980), &(0x7f00000009c0)=0x4) getsockname$inet(r2, &(0x7f0000000900)={0x2, 0x0, @dev}, &(0x7f0000000940)=0x10) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f00000000c0)={'syz_tun\x00'}) 03:33:33 executing program 4: getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f00000002c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000040)={@empty, @multicast1}, 0x73) 03:33:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, "10dec303415fe113b503cf1ae12551c61445c12e013d036d8beab09fd20f016238cbff4c48bedba30ba150f670d88ebe0a077b1bb29ee38b71b3515ce4ec8200", "c3174cfe994a2869e5662e1e2a72e0fb4aee287df2df380b95e5b25a31c8f999938bfe8bf214ff8e583ea7b0e03ff510bcddd4757451a798594da244e721450c", "a2b98fba2b259731fba7132ce30a6db82958009e4ff06da85422d63bc7d0db26"}) 03:33:33 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000300)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x408000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001380)={{{@in6, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/107, 0x6b) fsync(r1) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000000240)=0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd\x00') getdents64(r3, &(0x7f0000000380)=""/4096, 0x145f) 03:33:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1fffff, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:33 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000300)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x408000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001380)={{{@in6, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/107, 0x6b) fsync(r1) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000000240)=0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd\x00') getdents64(r3, &(0x7f0000000380)=""/4096, 0x145f) 03:33:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, "10dec303415fe113b503cf1ae12551c61445c12e013d036d8beab09fd20f016238cbff4c48bedba30ba150f670d88ebe0a077b1bb29ee38b71b3515ce4ec8200", "c3174cfe994a2869e5662e1e2a72e0fb4aee287df2df380b95e5b25a31c8f999938bfe8bf214ff8e583ea7b0e03ff510bcddd4757451a798594da244e721450c", "a2b98fba2b259731fba7132ce30a6db82958009e4ff06da85422d63bc7d0db26"}) 03:33:33 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000300)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x408000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001380)={{{@in6, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/107, 0x6b) fsync(r1) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000000240)=0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd\x00') getdents64(r3, &(0x7f0000000380)=""/4096, 0x145f) 03:33:33 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) r2 = dup(r1) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00002eaffc)=0x101, 0x4) connect$inet(r1, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) sendto$inet(r2, &(0x7f0000000200)="96", 0x1, 0x3fff, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000004bc0)={&(0x7f0000000000), 0xc, &(0x7f0000004b80)={&(0x7f0000000880)=ANY=[@ANYBLOB], 0x1}}, 0x0) socket$inet6(0xa, 0x0, 0x0) preadv(r0, &(0x7f0000000bc0)=[{&(0x7f00000007c0)=""/165, 0xa5}, {&(0x7f0000000880)=""/26, 0x1a}, {&(0x7f00000008c0)=""/185, 0xb9}, {&(0x7f0000000980)=""/227, 0xe3}, {&(0x7f0000000b40)=""/74, 0x4a}], 0x5, 0x0) sendto$inet(r2, &(0x7f0000000100)="89", 0x1, 0x3fffffd, &(0x7f00000001c0)={0x2, 0x0, @dev}, 0x10) write$vnet(r2, &(0x7f0000000580)={0x1, {&(0x7f0000000480)=""/202, 0x3d6, &(0x7f0000000380)=""/252}}, 0xfffffdef) 03:33:33 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000300)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x408000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001380)={{{@in6, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/107, 0x6b) fsync(r1) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000000240)=0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd\x00') getdents64(r3, &(0x7f0000000380)=""/4096, 0x145f) 03:33:33 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) r2 = dup(r1) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00002eaffc)=0x101, 0x4) connect$inet(r1, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) sendto$inet(r2, &(0x7f0000000200)="96", 0x1, 0x3fff, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000004bc0)={&(0x7f0000000000), 0xc, &(0x7f0000004b80)={&(0x7f0000000880)=ANY=[@ANYBLOB], 0x1}}, 0x0) socket$inet6(0xa, 0x0, 0x0) preadv(r0, &(0x7f0000000bc0)=[{&(0x7f00000007c0)=""/165, 0xa5}, {&(0x7f0000000880)=""/26, 0x1a}, {&(0x7f00000008c0)=""/185, 0xb9}, {&(0x7f0000000980)=""/227, 0xe3}, {&(0x7f0000000b40)=""/74, 0x4a}], 0x5, 0x0) sendto$inet(r2, &(0x7f0000000100)="89", 0x1, 0x3fffffd, &(0x7f00000001c0)={0x2, 0x0, @dev}, 0x10) write$vnet(r2, &(0x7f0000000580)={0x1, {&(0x7f0000000480)=""/202, 0x3d6, &(0x7f0000000380)=""/252}}, 0xfffffdef) 03:33:33 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000300)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x408000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001380)={{{@in6, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/107, 0x6b) fsync(r1) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000000240)=0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd\x00') getdents64(r3, &(0x7f0000000380)=""/4096, 0x145f) 03:33:33 executing program 5: mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00') keyctl$session_to_parent(0x12) fstat(0xffffffffffffff9c, &(0x7f0000000380)) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getgid() dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$unix(0xffffffffffffffff, &(0x7f0000000600)=@file={0x0, './file0\x00'}, 0x6e) getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000680)={0x10}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:33 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000300)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x408000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001380)={{{@in6, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/107, 0x6b) fsync(r1) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000000240)=0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd\x00') getdents64(r3, &(0x7f0000000380)=""/4096, 0x145f) 03:33:33 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000300)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x408000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001380)={{{@in6, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getdents64(0xffffffffffffffff, &(0x7f0000000100)=""/107, 0x6b) fsync(r1) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000000240)=0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd\x00') getdents64(r3, &(0x7f0000000380)=""/4096, 0x145f) 03:33:34 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f00000002c0), &(0x7f0000000080), &(0x7f0000000100)) 03:33:34 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='/dev/hwrng\x00', 0xffffffffffffff9c}, 0x10) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f00000013c0)="2700000014000725623b07030e0000120f0a00110001078a151f7508003900050000007e9ffc07", 0x27) 03:33:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x35, &(0x7f0000000180), 0x4) 03:33:34 executing program 0: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001000)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000640)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000002c0)="428055a0376969ef69dc3641673e66450f1a970c000000c4c2958e097f7f66460f3828523044c1908646d962788f8fc935c97d197a07f3d3e979aae1460f0da11b000000010d64ac1e5d31a314b706e20536f244ad7b7f") 03:33:34 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) r2 = dup(r1) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00002eaffc)=0x101, 0x4) connect$inet(r1, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) sendto$inet(r2, &(0x7f0000000200)="96", 0x1, 0x3fff, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000004bc0)={&(0x7f0000000000), 0xc, &(0x7f0000004b80)={&(0x7f0000000880)=ANY=[@ANYBLOB], 0x1}}, 0x0) socket$inet6(0xa, 0x0, 0x0) preadv(r0, &(0x7f0000000bc0)=[{&(0x7f00000007c0)=""/165, 0xa5}, {&(0x7f0000000880)=""/26, 0x1a}, {&(0x7f00000008c0)=""/185, 0xb9}, {&(0x7f0000000980)=""/227, 0xe3}, {&(0x7f0000000b40)=""/74, 0x4a}], 0x5, 0x0) sendto$inet(r2, &(0x7f0000000100)="89", 0x1, 0x3fffffd, &(0x7f00000001c0)={0x2, 0x0, @dev}, 0x10) write$vnet(r2, &(0x7f0000000580)={0x1, {&(0x7f0000000480)=""/202, 0x3d6, &(0x7f0000000380)=""/252}}, 0xfffffdef) 03:33:34 executing program 3: userfaultfd(0x0) times(&(0x7f0000000080)) getresuid(&(0x7f0000000600), &(0x7f0000000680), &(0x7f00000006c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") 03:33:34 executing program 0: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001000)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000640)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000002c0)="428055a0376969ef69dc3641673e66450f1a970c000000c4c2958e097f7f66460f3828523044c1908646d962788f8fc935c97d197a07f3d3e979aae1460f0da11b000000010d64ac1e5d31a314b706e20536f244ad7b7f") 03:33:34 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) r2 = dup(r1) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00002eaffc)=0x101, 0x4) connect$inet(r1, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) sendto$inet(r2, &(0x7f0000000200)="96", 0x1, 0x3fff, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000004bc0)={&(0x7f0000000000), 0xc, &(0x7f0000004b80)={&(0x7f0000000880)=ANY=[@ANYBLOB], 0x1}}, 0x0) socket$inet6(0xa, 0x0, 0x0) preadv(r0, &(0x7f0000000bc0)=[{&(0x7f00000007c0)=""/165, 0xa5}, {&(0x7f0000000880)=""/26, 0x1a}, {&(0x7f00000008c0)=""/185, 0xb9}, {&(0x7f0000000980)=""/227, 0xe3}, {&(0x7f0000000b40)=""/74, 0x4a}], 0x5, 0x0) sendto$inet(r2, &(0x7f0000000100)="89", 0x1, 0x3fffffd, &(0x7f00000001c0)={0x2, 0x0, @dev}, 0x10) write$vnet(r2, &(0x7f0000000580)={0x1, {&(0x7f0000000480)=""/202, 0x3d6, &(0x7f0000000380)=""/252}}, 0xfffffdef) 03:33:34 executing program 5: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01eec4c14915980c0000009f") 03:33:34 executing program 0: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001000)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000640)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000002c0)="428055a0376969ef69dc3641673e66450f1a970c000000c4c2958e097f7f66460f3828523044c1908646d962788f8fc935c97d197a07f3d3e979aae1460f0da11b000000010d64ac1e5d31a314b706e20536f244ad7b7f") 03:33:34 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file1\x00', 0xfff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f00000002c0)=ANY=[]) 03:33:35 executing program 4: r0 = memfd_create(&(0x7f000003e000)='\t', 0x0) r1 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) r2 = dup2(r1, r0) r3 = memfd_create(&(0x7f00008effff)='\t', 0x0) dup2(r2, r3) write$sndseq(r3, &(0x7f0000e6ffd0)=[{0x5, 0x0, 0x0, 0x3fd, @time}], 0x30) [ 338.782168] attempt to access beyond end of device [ 338.805139] loop3: rw=4096, want=32768, limit=7 [ 338.820492] XFS (loop3): last sector read failed 03:33:35 executing program 0: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'sit0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001000)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000003c0)) pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000640)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000002c0)="428055a0376969ef69dc3641673e66450f1a970c000000c4c2958e097f7f66460f3828523044c1908646d962788f8fc935c97d197a07f3d3e979aae1460f0da11b000000010d64ac1e5d31a314b706e20536f244ad7b7f") 03:33:35 executing program 4: r0 = memfd_create(&(0x7f000003e000)='\t', 0x0) r1 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) r2 = dup2(r1, r0) r3 = memfd_create(&(0x7f00008effff)='\t', 0x0) dup2(r2, r3) write$sndseq(r3, &(0x7f0000e6ffd0)=[{0x5, 0x0, 0x0, 0x3fd, @time}], 0x30) 03:33:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0xa}, 0x1c) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmsg$nl_crypto(r1, &(0x7f0000000200)={&(0x7f00009dd000), 0xc, &(0x7f00002ceff0)={&(0x7f000097b000)=@delrng={0x10}, 0x10}}, 0x0) 03:33:35 executing program 4: r0 = memfd_create(&(0x7f000003e000)='\t', 0x0) r1 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) r2 = dup2(r1, r0) r3 = memfd_create(&(0x7f00008effff)='\t', 0x0) dup2(r2, r3) write$sndseq(r3, &(0x7f0000e6ffd0)=[{0x5, 0x0, 0x0, 0x3fd, @time}], 0x30) 03:33:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000000000000800000000000e00000010000000000000000000035000000000000000000000000ff00000000030006000000000002000004000000bb000000000000000003000500000000000200423b000000000000004000000000"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 03:33:35 executing program 4: r0 = memfd_create(&(0x7f000003e000)='\t', 0x0) r1 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) r2 = dup2(r1, r0) r3 = memfd_create(&(0x7f00008effff)='\t', 0x0) dup2(r2, r3) write$sndseq(r3, &(0x7f0000e6ffd0)=[{0x5, 0x0, 0x0, 0x3fd, @time}], 0x30) 03:33:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000040)="1f00000003031900030007000000068100023b0509000100010100ff1ffe58", 0x1f}], 0x1) 03:33:35 executing program 3: getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)}, &(0x7f00000002c0)=0x10) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x60) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000300), &(0x7f00000003c0)=0x8) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:35 executing program 5: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01eec4c14915980c0000009f") 03:33:35 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000300)) mount$bpf(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000380)='bpf\x00', 0x20000, &(0x7f0000000580)) mount$bpf(0x20000000, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f00000002c0)='bpf\x00', 0x200c, &(0x7f0000000100)) 03:33:35 executing program 4: munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @broadcast, 0x0, 0x0, 'lblcr\x00'}, {@broadcast}}, 0x44) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f00000006c0), &(0x7f0000000740)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000480)) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000980)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a06c4c111d28da3000000c1d0868f2878c15b04f48fc93e660fe02c0b39e54175455d0f2e1a1a010d64ac1e5d31a3b786e2987f") 03:33:35 executing program 2: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000000)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, &(0x7f0000000340)) 03:33:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xfffffffffffffe14) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x101001, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, &(0x7f0000000100)="22694a04fcc9c7568a0315134c4823b2364ffa853652286cfd679dd8dfa4e1881ac06af04a494da168419d61b32c76d746d9b5f91a664a8ba8c8659847eccbbf", &(0x7f00000014c0)=""/204}, 0x18) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000080)='X', 0x1, 0xe4ffffff00000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x3, @loopback}, 0x1c) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000006c0)) r4 = dup2(r0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000002c0), 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f00000007c0), 0x9) r5 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x837b91954f8c7c56) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000800)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000001380)={0x0, @in={{0x2, 0x4e22, @multicast2}}, [0x0, 0xffff, 0x4, 0x0, 0x0, 0x0, 0xb14a, 0x5, 0x1, 0x8, 0x0, 0x0, 0x0, 0xff]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x401, 0x30}, &(0x7f0000001480)=0xc) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000640)={0x5, 0x965, &(0x7f00000004c0)="fd10633ec53ad38e0ded66d17767c5096bba890c13ce9de64522b0e374595a984845848e5b67d1dc91fbba47d50765b122c29d1d59fe3ba7850bd401bc3cdcf51aa155d807d2dfc4b9bd33c7df60b463e9f484d3684e3622087ad9c96cf628641faddf1316cb2d8ca8f0adb0e066298a26f1a29cdc91d6dd808cd4ff4c3ab4a4d338bc096d5fb4229232a2da1cd72e76c2a1a9b15d3ade5220c799128dd3a2eb21c0cddf1e2faa46dd4a5a40a96950c5c71b6e598d7fbb2c0a1f10bf7017d347e4f83a0b703b7258b85a6fdf6fb57bb4e11430ab84b7", &(0x7f00000005c0)="05e5e9ffb80ee85b0d902b6c391cacea5ef3366d1dd12df8283fe679a7eaedd13c6537b9fa2eb8f034bc0e04e582f75ba830c583d1be0fda98c05a40e6089615aa9e67", 0xd6, 0x43}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x0, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000380)={0x15, 0x110, 0xfa00, {r6, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"2e98952e805a1acdbf60867cea48bd81"}, 0x85f, 0xff}, @in={0x2, 0x4e23, @multicast1}}}, 0x118) 03:33:35 executing program 0: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 339.508441] FAT-fs (loop2): Directory bread(block 64) failed [ 339.514605] FAT-fs (loop2): Directory bread(block 65) failed [ 339.520440] FAT-fs (loop2): Directory bread(block 66) failed [ 339.526386] FAT-fs (loop2): Directory bread(block 67) failed [ 339.532250] FAT-fs (loop2): Directory bread(block 68) failed [ 339.538426] FAT-fs (loop2): Directory bread(block 69) failed 03:33:35 executing program 3: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) lstat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in=@loopback, @in6=@remote}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000007c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000880)=0xe8) getresuid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) getgid() getgroups(0x0, &(0x7f0000000c40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000540)='system.posix_acl_default\x00', &(0x7f0000000d00), 0x24, 0x0) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000380)) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000016c0)=""/231, 0xe7}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001b80)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000000440), 0xc, &(0x7f00000019c0)={&(0x7f0000001980)=@getlink={0x20}, 0x20}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) pipe(&(0x7f0000000480)) add_key$user(&(0x7f00000017c0)='user\x00', &(0x7f0000001800), &(0x7f0000001840), 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000018c0)='id_resolver\x00', &(0x7f0000001a40), &(0x7f0000001a80), 0x0, 0x0) keyctl$link(0x8, 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) futex(&(0x7f0000000200), 0x0, 0x0, &(0x7f0000000240), &(0x7f00000002c0), 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000280)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000180)) keyctl$link(0x8, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") [ 339.558026] FAT-fs (loop2): Directory bread(block 70) failed [ 339.567778] FAT-fs (loop2): Directory bread(block 71) failed [ 339.577778] FAT-fs (loop2): Directory bread(block 72) failed [ 339.587524] FAT-fs (loop2): Directory bread(block 73) failed 03:33:35 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x1) 03:33:36 executing program 4: getrusage(0x0, &(0x7f0000000800)) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='eth1\x00', 0xffffffffffffff9c}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)={@rand_addr, @multicast2}, &(0x7f0000000340)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev, @in6=@mcast1}}, {{@in6=@mcast2}}}, &(0x7f0000000480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000000600), &(0x7f0000000640)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000006c0)={0x0, @rand_addr}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000008c0)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x231) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000005c0)=ANY=[], 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00'}, {@rand_addr}}, 0x44) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@loopback, @in6=@local}}, {{@in6=@remote}}}, &(0x7f0000000b00)=0xe8) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000b40)={'team_slave_0\x00'}) 03:33:36 executing program 2: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f00000002c0)) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000400)=""/195) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000280)) 03:33:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xfffffffffffffe14) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x101001, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, &(0x7f0000000100)="22694a04fcc9c7568a0315134c4823b2364ffa853652286cfd679dd8dfa4e1881ac06af04a494da168419d61b32c76d746d9b5f91a664a8ba8c8659847eccbbf", &(0x7f00000014c0)=""/204}, 0x18) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000080)='X', 0x1, 0xe4ffffff00000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x3, @loopback}, 0x1c) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000006c0)) r4 = dup2(r0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000002c0), 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f00000007c0), 0x9) r5 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x837b91954f8c7c56) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000800)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000001380)={0x0, @in={{0x2, 0x4e22, @multicast2}}, [0x0, 0xffff, 0x4, 0x0, 0x0, 0x0, 0xb14a, 0x5, 0x1, 0x8, 0x0, 0x0, 0x0, 0xff]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x401, 0x30}, &(0x7f0000001480)=0xc) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000640)={0x5, 0x965, &(0x7f00000004c0)="fd10633ec53ad38e0ded66d17767c5096bba890c13ce9de64522b0e374595a984845848e5b67d1dc91fbba47d50765b122c29d1d59fe3ba7850bd401bc3cdcf51aa155d807d2dfc4b9bd33c7df60b463e9f484d3684e3622087ad9c96cf628641faddf1316cb2d8ca8f0adb0e066298a26f1a29cdc91d6dd808cd4ff4c3ab4a4d338bc096d5fb4229232a2da1cd72e76c2a1a9b15d3ade5220c799128dd3a2eb21c0cddf1e2faa46dd4a5a40a96950c5c71b6e598d7fbb2c0a1f10bf7017d347e4f83a0b703b7258b85a6fdf6fb57bb4e11430ab84b7", &(0x7f00000005c0)="05e5e9ffb80ee85b0d902b6c391cacea5ef3366d1dd12df8283fe679a7eaedd13c6537b9fa2eb8f034bc0e04e582f75ba830c583d1be0fda98c05a40e6089615aa9e67", 0xd6, 0x43}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x0, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000380)={0x15, 0x110, 0xfa00, {r6, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"2e98952e805a1acdbf60867cea48bd81"}, 0x85f, 0xff}, @in={0x2, 0x4e23, @multicast1}}}, 0x118) 03:33:36 executing program 5: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01eec4c14915980c0000009f") 03:33:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000040)="65640f20640f015b2f2486416f430f01dbc441fa70b600480000000f0848b801000100000000000f23d00f21f835000000010f23f866baf80cb824226f8eef66bafc0cedf3ab", 0x46}], 0x1, 0x54, &(0x7f0000000100), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:37 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x5, 0x9d, 0xee4, 0x1f}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001bc0)={r0, &(0x7f0000000180), &(0x7f0000001b80)=""/30}, 0x18) 03:33:37 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:33:37 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xfffffffffffffe14) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x101001, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, &(0x7f0000000100)="22694a04fcc9c7568a0315134c4823b2364ffa853652286cfd679dd8dfa4e1881ac06af04a494da168419d61b32c76d746d9b5f91a664a8ba8c8659847eccbbf", &(0x7f00000014c0)=""/204}, 0x18) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000080)='X', 0x1, 0xe4ffffff00000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x3, @loopback}, 0x1c) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000006c0)) r4 = dup2(r0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000002c0), 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f00000007c0), 0x9) r5 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x837b91954f8c7c56) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000800)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000001380)={0x0, @in={{0x2, 0x4e22, @multicast2}}, [0x0, 0xffff, 0x4, 0x0, 0x0, 0x0, 0xb14a, 0x5, 0x1, 0x8, 0x0, 0x0, 0x0, 0xff]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x401, 0x30}, &(0x7f0000001480)=0xc) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000640)={0x5, 0x965, &(0x7f00000004c0)="fd10633ec53ad38e0ded66d17767c5096bba890c13ce9de64522b0e374595a984845848e5b67d1dc91fbba47d50765b122c29d1d59fe3ba7850bd401bc3cdcf51aa155d807d2dfc4b9bd33c7df60b463e9f484d3684e3622087ad9c96cf628641faddf1316cb2d8ca8f0adb0e066298a26f1a29cdc91d6dd808cd4ff4c3ab4a4d338bc096d5fb4229232a2da1cd72e76c2a1a9b15d3ade5220c799128dd3a2eb21c0cddf1e2faa46dd4a5a40a96950c5c71b6e598d7fbb2c0a1f10bf7017d347e4f83a0b703b7258b85a6fdf6fb57bb4e11430ab84b7", &(0x7f00000005c0)="05e5e9ffb80ee85b0d902b6c391cacea5ef3366d1dd12df8283fe679a7eaedd13c6537b9fa2eb8f034bc0e04e582f75ba830c583d1be0fda98c05a40e6089615aa9e67", 0xd6, 0x43}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x0, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000380)={0x15, 0x110, 0xfa00, {r6, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"2e98952e805a1acdbf60867cea48bd81"}, 0x85f, 0xff}, @in={0x2, 0x4e23, @multicast1}}}, 0x118) 03:33:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40100, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3305, &(0x7f0000000240)) [ 341.062954] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 341.102144] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 03:33:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000040)="65640f20640f015b2f2486416f430f01dbc441fa70b600480000000f0848b801000100000000000f23d00f21f835000000010f23f866baf80cb824226f8eef66bafc0cedf3ab", 0x46}], 0x1, 0x54, &(0x7f0000000100), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 341.123263] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 341.144147] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 341.166314] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 341.211722] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 341.256478] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 341.295555] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 03:33:37 executing program 2: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:37 executing program 5: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01eec4c14915980c0000009f") [ 341.327014] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 341.380065] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 341.432523] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 341.502153] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 341.530683] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 341.551205] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 [ 341.600714] Restarting kernel threads ... done. [ 341.615109] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 341.649436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 03:33:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xfffffffffffffe14) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x101001, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, &(0x7f0000000100)="22694a04fcc9c7568a0315134c4823b2364ffa853652286cfd679dd8dfa4e1881ac06af04a494da168419d61b32c76d746d9b5f91a664a8ba8c8659847eccbbf", &(0x7f00000014c0)=""/204}, 0x18) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000080)='X', 0x1, 0xe4ffffff00000000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x3, @loopback}, 0x1c) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000006c0)) r4 = dup2(r0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000002c0), 0x4) sendfile(0xffffffffffffffff, r0, &(0x7f00000007c0), 0x9) r5 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x837b91954f8c7c56) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000800)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000001380)={0x0, @in={{0x2, 0x4e22, @multicast2}}, [0x0, 0xffff, 0x4, 0x0, 0x0, 0x0, 0xb14a, 0x5, 0x1, 0x8, 0x0, 0x0, 0x0, 0xff]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x401, 0x30}, &(0x7f0000001480)=0xc) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000640)={0x5, 0x965, &(0x7f00000004c0)="fd10633ec53ad38e0ded66d17767c5096bba890c13ce9de64522b0e374595a984845848e5b67d1dc91fbba47d50765b122c29d1d59fe3ba7850bd401bc3cdcf51aa155d807d2dfc4b9bd33c7df60b463e9f484d3684e3622087ad9c96cf628641faddf1316cb2d8ca8f0adb0e066298a26f1a29cdc91d6dd808cd4ff4c3ab4a4d338bc096d5fb4229232a2da1cd72e76c2a1a9b15d3ade5220c799128dd3a2eb21c0cddf1e2faa46dd4a5a40a96950c5c71b6e598d7fbb2c0a1f10bf7017d347e4f83a0b703b7258b85a6fdf6fb57bb4e11430ab84b7", &(0x7f00000005c0)="05e5e9ffb80ee85b0d902b6c391cacea5ef3366d1dd12df8283fe679a7eaedd13c6537b9fa2eb8f034bc0e04e582f75ba830c583d1be0fda98c05a40e6089615aa9e67", 0xd6, 0x43}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x0, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000380)={0x15, 0x110, 0xfa00, {r6, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"2e98952e805a1acdbf60867cea48bd81"}, 0x85f, 0xff}, @in={0x2, 0x4e23, @multicast1}}}, 0x118) [ 341.665869] Restarting kernel threads ... done. [ 341.673688] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 341.698180] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 03:33:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40100, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3305, &(0x7f0000000240)) [ 341.730162] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 341.766202] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 341.798988] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 341.826287] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 341.869148] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 342.007032] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 03:33:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000040)="65640f20640f015b2f2486416f430f01dbc441fa70b600480000000f0848b801000100000000000f23d00f21f835000000010f23f866baf80cb824226f8eef66bafc0cedf3ab", 0x46}], 0x1, 0x54, &(0x7f0000000100), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:38 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) [ 342.223870] Restarting kernel threads ... done. 03:33:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40100, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3305, &(0x7f0000000240)) 03:33:38 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:33:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40100, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3305, &(0x7f0000000240)) 03:33:38 executing program 5: clock_gettime(0x2, &(0x7f00000000c0)) accept(0xffffffffffffffff, &(0x7f0000000140)=@nl=@unspec, &(0x7f0000000200)=0x80) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280), &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000300)=@assoc_value, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:38 executing program 1: clock_getres(0x19bbfd0afe09e2a, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe2$9p(&(0x7f0000000180), 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000340)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a00)) openat$null(0xffffffffffffff9c, &(0x7f0000003340)='/dev/null\x00', 0x0, 0x0) getpgid(0x0) signalfd(0xffffffffffffff9c, &(0x7f0000004a80), 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000004ac0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004b00)) getresuid(&(0x7f0000004b40), &(0x7f0000004b80), &(0x7f0000004bc0)) gettid() getuid() getresgid(&(0x7f0000004f80), &(0x7f0000004fc0), &(0x7f0000005000)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000005040)) getuid() getgroups(0x0, &(0x7f0000005080)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000050c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005100)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000005200)=0xe8) getgroups(0x0, &(0x7f0000005240)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005300)={&(0x7f0000000140)=@proc, 0xc, &(0x7f0000004f40), 0x0, &(0x7f0000005280)}, 0x0) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000040)) keyctl$join(0x1, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400), 0xc, &(0x7f0000000580)={&(0x7f0000000840)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)="6e65742f6970365f666c6f776c6162656c006ec03114893458edc1c9d8dc4b0d8dae982640d0e60400d7ff596e1c92de0eaa311f0a4d43697c2bcd77f017365af160acf33bd66432ebe50c0e8bdaf7fc39feff34ef27a1397193227f4733c145e66536c6c275112520e72b3097843b5cdac480c3b1384ebf592505f88589fcd2d7000000") sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000380), 0x0) getpgid(0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000300)) write$evdev(0xffffffffffffffff, &(0x7f0000000340), 0x175) syz_execute_func(&(0x7f0000000500)="428055a0876969ef69dc00d9f0008f00008020c421da7fb43232233333183737660f3838d8c4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a140008000011f0802403088e9fa3c4033d5c160e4b") 03:33:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000040)="65640f20640f015b2f2486416f430f01dbc441fa70b600480000000f0848b801000100000000000f23d00f21f835000000010f23f866baf80cb824226f8eef66bafc0cedf3ab", 0x46}], 0x1, 0x54, &(0x7f0000000100), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 342.565823] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 342.572560] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 342.631999] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 342.673843] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 342.687853] Restarting kernel threads ... [ 342.697701] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 342.700340] done. [ 342.708167] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 342.729037] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 342.753465] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 342.775380] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 342.793152] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 342.809613] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 03:33:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40100, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3305, &(0x7f0000000240)) [ 342.829140] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz1 03:33:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40100, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3305, &(0x7f0000000240)) 03:33:39 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:33:39 executing program 0: r0 = getpgrp(0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x8001) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0x5bb6) read(r1, &(0x7f0000000140)=""/117, 0x75) [ 343.081777] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 343.116675] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 343.138897] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 343.174053] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 343.180825] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 343.216703] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 343.235515] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 343.242265] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 343.284385] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 343.291169] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 343.302840] Restarting kernel threads ... done. 03:33:39 executing program 5: accept4(0xffffffffffffffff, &(0x7f0000000140)=@can, 0xfffffffffffffffd, 0x0) prctl$setfpexc(0xc, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000001640), 0x0, 0x0, &(0x7f0000000280)={0x77359400}) dup2(0xffffffffffffffff, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, &(0x7f0000001800), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000000540), 0x1000) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000440)=""/216, &(0x7f0000000080)=0xd8) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000340)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}, 0x5c) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'veth0\x00', {0x2, 0x0, @multicast2}}) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0e6891f7f558164d5802117f9fb14b535c9d0799298221d73d17906e14f7c60a2012da351b9bb26e24bcea84de7072187d709074630e08e5fe6733548dba8016", "fdf31d3b6f2573b00cb5a6d2f4c79c2a996cd36812e4db85ae45b914fc6fdddd642b5aa7375128527482fef1aff52aa1d8b1570dec0ab38220e9ec62b37ff248", "808870410e86eed5212db7d390a8e7406b29b0371beda7cb6170b29be4dc01cf"}) clock_gettime(0x0, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000002800)=""/4096) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000003900)={{}, 'syz1\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) semget$private(0x0, 0x0, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f00000017c0)) syz_execute_func(&(0x7f0000001540)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000240)={0x28}, 0x28) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000003980)) msgget(0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f00000003c0)) io_cancel(0x0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000003800)}, &(0x7f00000038c0)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "b925c2a55552f54a9c487cdcc032caf323560fc4f16dd0a8bf44932ba520daf1e1a738e75b556c8f1e11310b72a11a6ae41b8bc4dfbc3835b1f9762d95264441", "69e8a0ecd2792c3cbf7b1b64d19fce230ee5b497bc77e8ada96ec7cc60210c5b1594fa835134834b2f2970e94d205e461290e04971dee3326f3c2aa00c19db8b", "08a73ff2f63c5e86793a11116359c55ca4e986efbbee27f5fa206108ec63d16d"}) 03:33:39 executing program 3: semget$private(0x0, 0x2, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="f5428055a0727269ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5c4015dd8144af2ed2e1a1a3ef0f6585aab550101a3b786e298edc4227992749f55") [ 343.343186] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 343.379245] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz1 03:33:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40100, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3305, &(0x7f0000000240)) 03:33:39 executing program 4: socket$inet(0x2, 0x20000010000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240), &(0x7f0000000280)=':,selfppp1vmnet0systemkeyringcpuset\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) 03:33:40 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000340)='reiserfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000600)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 343.882104] Restarting kernel threads ... [ 343.883986] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 343.901534] done. 03:33:40 executing program 0: r0 = getpgrp(0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x8001) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0x5bb6) read(r1, &(0x7f0000000140)=""/117, 0x75) [ 344.002586] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 03:33:40 executing program 2: clock_gettime(0x7fffffffffffffd, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000240)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000380)={0x0, 0x1, 0x6, @local}, 0x10) syz_execute_func(&(0x7f0000000500)="428055a0876969effb69dcfdd9d94e8f044ab9003c80203c80207fb432322333331837370f38211ac4c19086d9f28fc965670f19c54e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f07b80802403cec4c229f7014b") futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) exit(0x0) getegid() openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) wait4(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000640)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 03:33:40 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x9) 03:33:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") mkdir(&(0x7f0000000000)='./control\x00', 0x0) r1 = userfaultfd(0x0) close(r1) r2 = creat(&(0x7f0000000040)='./control/file0\x00', 0x0) fcntl$setlease(r2, 0x400, 0x0) unlink(&(0x7f0000f86000)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') close(r1) 03:33:40 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x2405, &(0x7f00000000c0)) 03:33:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") mkdir(&(0x7f0000000000)='./control\x00', 0x0) r1 = userfaultfd(0x0) close(r1) r2 = creat(&(0x7f0000000040)='./control/file0\x00', 0x0) fcntl$setlease(r2, 0x400, 0x0) unlink(&(0x7f0000f86000)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') close(r1) 03:33:40 executing program 5: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:33:40 executing program 4: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000600)) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000100), 0x4) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) read$FUSE(r0, &(0x7f00000015c0), 0xe25) 03:33:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000300)={{}, {0x1, 0x4, 0xfffff000}, [], {}, [], {0x10, 0x6}, {0x20, 0x2}}, 0x24, 0x2) 03:33:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") mkdir(&(0x7f0000000000)='./control\x00', 0x0) r1 = userfaultfd(0x0) close(r1) r2 = creat(&(0x7f0000000040)='./control/file0\x00', 0x0) fcntl$setlease(r2, 0x400, 0x0) unlink(&(0x7f0000f86000)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') close(r1) 03:33:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000300)={{}, {0x1, 0x4, 0xfffff000}, [], {}, [], {0x10, 0x6}, {0x20, 0x2}}, 0x24, 0x2) 03:33:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000300)={{}, {0x1, 0x4, 0xfffff000}, [], {}, [], {0x10, 0x6}, {0x20, 0x2}}, 0x24, 0x2) 03:33:41 executing program 0: r0 = getpgrp(0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x8001) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0x5bb6) read(r1, &(0x7f0000000140)=""/117, 0x75) 03:33:41 executing program 2: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$zero(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/zero\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000240), &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000380)) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) setuid(0x0) pselect6(0x40, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000440)={&(0x7f0000000400), 0x8}) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000880)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @rand_addr, @multicast2}, &(0x7f00000008c0)=0x27b) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @local}, @in6=@local}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000c40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@dev, @in=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000dc0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{}, 0x0, @in=@local}}, &(0x7f0000000f00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001240)={{{@in=@loopback, @in6=@remote}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001080)={0x0, @broadcast}, &(0x7f00000010c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001100)={'sit0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a80)={{{@in6=@ipv4={[], [], @broadcast}}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000003b80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003bc0)={{{@in=@rand_addr, @in6=@local}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000003cc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000003d00), &(0x7f0000003d40)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d80)={{{@in=@remote, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000003e80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000047c0)={"62816964675c70fc7c90a2655f3100"}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004800)={{{@in=@loopback, @in6}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000004900)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004940)={@dev}, &(0x7f0000004980)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000049c0), &(0x7f0000004a00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000004a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004ac0)={@loopback}, &(0x7f0000004b00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001140)={{{@in6=@local, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000a80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008bc0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000008c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008c40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008c80)={@dev, @multicast1}, &(0x7f0000008cc0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000008d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008d40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008dc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009500)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000009540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009580)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000009c80)={'bridge_slave_1\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@loopback, @multicast1}, &(0x7f0000009d00)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000a8c0)={&(0x7f0000000780), 0xc, &(0x7f000000a880)={&(0x7f0000009d40)=ANY=[]}}, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) clock_gettime(0x0, &(0x7f0000000500)) 03:33:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") mkdir(&(0x7f0000000000)='./control\x00', 0x0) r1 = userfaultfd(0x0) close(r1) r2 = creat(&(0x7f0000000040)='./control/file0\x00', 0x0) fcntl$setlease(r2, 0x400, 0x0) unlink(&(0x7f0000f86000)='./control/file0\x00') rmdir(&(0x7f00000000c0)='./control\x00') close(r1) 03:33:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000300)={{}, {0x1, 0x4, 0xfffff000}, [], {}, [], {0x10, 0x6}, {0x20, 0x2}}, 0x24, 0x2) 03:33:41 executing program 3: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ftruncate(r0, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) lstat(&(0x7f0000002b80)='./bus\x00', &(0x7f0000002bc0)) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000012ff8)='./file0\x00') fallocate(r0, 0x0, 0x7, 0x8000) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RRENAME(r2, &(0x7f0000000040)={0x7}, 0x7) sendfile(r0, r3, &(0x7f0000d83ff8), 0x8000ffffffff) 03:33:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000004300)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340)) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000240), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0xfffffffffffffce7) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000980)={{{@in=@multicast1, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)={@remote}, &(0x7f0000002040)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'yam0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002280)={@local, @remote}, &(0x7f00000022c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f00000024c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002540)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002580)={0x0, @multicast2, @multicast1}, &(0x7f00000025c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000026c0)={{{@in, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002800)={@dev}, &(0x7f0000002840)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002980)={@mcast1}, &(0x7f00000029c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002a40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002a80)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000002b80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002c80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002cc0)={{{@in6=@ipv4={[], [], @loopback}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000002dc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002e00)={@remote, @local}, &(0x7f0000002e40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002e80)={{{@in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000002f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002fc0)={{{@in=@remote, @in=@rand_addr}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f00000030c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003100)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003140)={0x0, @remote, @remote}, &(0x7f0000003180)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000003880)={&(0x7f0000000140), 0xc, &(0x7f0000003840)={&(0x7f0000000ac0)=ANY=[]}}, 0x0) request_key(&(0x7f00000004c0)='rxrpc_s\x00', &(0x7f0000000500), &(0x7f0000000540)="7465716c30000000763c24682727162d", 0xfffffffffffffffb) 03:33:41 executing program 5: futex(&(0x7f0000000040), 0xa, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001dc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001f00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f40)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000002040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002080)={@multicast2, @dev}, &(0x7f00000020c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002140)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002300), &(0x7f0000002340)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002440)={0x0, @remote, @local}, &(0x7f0000002480)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000480), 0xc, &(0x7f00000028c0)={&(0x7f00000024c0)={0x14}, 0x14}}, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) fstat(0xffffffffffffffff, &(0x7f0000001080)) fstat(0xffffffffffffff9c, &(0x7f0000001100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:41 executing program 4: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000600)) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000100), 0x4) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) read$FUSE(r0, &(0x7f00000015c0), 0xe25) 03:33:41 executing program 3: mmap(&(0x7f0000000000/0xfd5000)=nil, 0xfd5000, 0x100000d, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2000080003, 0x2) getsockopt(r0, 0x0, 0xcf, &(0x7f00000000c0)=""/8, &(0x7f0000000100)=0x8) 03:33:41 executing program 3: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x0, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:42 executing program 0: r0 = getpgrp(0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x8001) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0x5bb6) read(r1, &(0x7f0000000140)=""/117, 0x75) 03:33:42 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="223f6234488dd25d766070") sendmsg$key(r0, &(0x7f0000f56000)={0x4000000, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000005a4c564800000002000900400000000e2bbc0000000000030006000000000002000000e0000054d81458186fe8b900020001000000000000fb0207efab073e03000500000600000200ffff010000000000000000000000"], 0x60}}, 0x0) 03:33:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000580)={&(0x7f0000000080), 0xc, &(0x7f0000000540)={&(0x7f00000003c0)=@updpolicy={0xc4, 0x19, 0x209, 0x0, 0x0, {{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@mark={0xc}]}, 0xc4}}, 0x0) 03:33:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RGETLOCK(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="b8"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:33:42 executing program 5: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x8002) ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000040)=0x2) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) prctl$getreaper(0x0, &(0x7f0000000380)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) 03:33:42 executing program 4: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000600)) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000100), 0x4) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) read$FUSE(r0, &(0x7f00000015c0), 0xe25) 03:33:42 executing program 2: ioperm(0x0, 0x101, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000300), &(0x7f00000003c0)=0x1c, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@loopback}, &(0x7f0000000440)=0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@rand_addr}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @dev, @local}, &(0x7f00000005c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team_slave_1\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000a40)={{{@in=@loopback, @in=@broadcast}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@dev}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000cc0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e40)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000f40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f80)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000001080)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001100)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001140)={0x0, @rand_addr, @multicast2}, &(0x7f0000001180)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000011c0)={@mcast1}, &(0x7f0000001200)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001240)={@dev, @multicast1}, &(0x7f0000001280)=0xc) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f00000006c0)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000340)="580000001200ad99b6323b470c458c5602067fff04008100c62019fe4fec6b224e220000ac1414aa0b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000", 0x58}], 0x1) 03:33:42 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x88) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000a80)="153f6234488dd25d766070") setsockopt$inet6_udp_int(r0, 0x11, 0x100000000a, &(0x7f0000f9bffc)=0x7ff, 0x4) sendmsg$inet_sctp(r0, &(0x7f0000000000)={&(0x7f0000ed5fe4)=@in6={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, &(0x7f0000001040)=[{&(0x7f0000000040)="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", 0x7f8}], 0x1}, 0x0) 03:33:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RGETLOCK(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="b8"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:33:42 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}}) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) flock(0xffffffffffffffff, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") msgget(0xffffffffffffffff, 0x0) 03:33:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:33:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RGETLOCK(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="b8"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:33:43 executing program 0: chmod(&(0x7f0000000140)='./file0\x00', 0x0) getgid() seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f00000014c0)={0x14}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RGETLOCK(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="b8"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:33:43 executing program 4: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000600)) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000100), 0x4) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) read$FUSE(r0, &(0x7f00000015c0), 0xe25) 03:33:43 executing program 1: keyctl$dh_compute(0x15, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:43 executing program 2: clock_gettime(0x1, &(0x7f00000002c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:43 executing program 3: r0 = socket(0x10, 0x10000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = memfd_create(&(0x7f00000000c0)="0099e62aaf0000000000", 0x0) clone(0x102102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) setreuid(0x0, r1) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000040), 0x1000) 03:33:43 executing program 5: munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000900)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000940)=0x1c, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000980)) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:43 executing program 3: keyctl$invalidate(0x7, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@mcast2, @in6}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) request_key(&(0x7f00000006c0)='big_key\x00', &(0x7f0000000700), &(0x7f0000000740)='/dev/adsp#\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000780)='blacklist\x00', &(0x7f00000007c0), &(0x7f0000000800)='/vmnet0&louser\x00', 0x0) add_key(&(0x7f0000000840)='blacklist\x00', &(0x7f0000000880), &(0x7f00000008c0), 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/ip6_tables_names\x00') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000003c0)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000400), 0x12) add_key$keyring(&(0x7f0000001900)='keyring\x00', &(0x7f0000001940), 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000001b40), &(0x7f0000000380), &(0x7f0000001b80), 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f00000004c0)="428055a0610fef69dce9e42a5c41ff0f8f49189850312ef2f2ec712d0f76382127c42127fd2520410feefa4e217919fbfbf54177455de0932ebc2ebc0d64ac1e5d9f997f") 03:33:44 executing program 0: iopl(0x2) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0), 0x4) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000140), &(0x7f0000000180)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0), &(0x7f0000000200)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4e19086d90dba8fc9c90feefa4e2179fbe5e565f247af0f2e1ac4010d64ac1e5d31a3b706f08024030866430ff5e04b") 03:33:44 executing program 4: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)) close(0xffffffffffffffff) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000d77000)=@abs, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000001c0)=""/167) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)=ANY=[], &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000023c0)=@assoc_value, &(0x7f0000002400)=0x8) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000400), &(0x7f0000004b40)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in6, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) 03:33:44 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f0000000140)=@nl=@unspec, &(0x7f0000000200)=0x80) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) dup(0xffffffffffffffff) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000580)={0x34, 0x0, &(0x7f0000000500)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fgetxattr(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)=""/73, 0x49) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0x8) accept(0xffffffffffffffff, &(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f00000001c0)=0x80) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000005c0), &(0x7f0000000600)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/163, 0xa3, 0x0, &(0x7f0000000140)={0x0, 0x989680}) 03:33:44 executing program 2: clock_gettime(0x1, &(0x7f00000002c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:44 executing program 5: getpgrp(0x0) socket$inet_tcp(0x2, 0x1, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:44 executing program 3: eventfd2(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000540)={{{@in=@multicast1, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000640)=0xe8) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000740), 0x24, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) lstat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)) umount2(&(0x7f0000000180)='./file0\x00', 0x2) write$FUSE_DIRENT(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000b7f5ec2d70066ce656d316e6f246576656d31000000000000000000f386616a1a0a3c0000000000002c0e0000000000619fcd3823b7c9c6bd3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce146ddb4ddefa62f4fe745fe700471"], 0x90) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:33:45 executing program 4: keyctl$set_reqkey_keyring(0x7, 0xb000400) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() 03:33:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r1, &(0x7f00003edfff), 0x0, 0x0, &(0x7f0000dfcff0)={0x2, 0x4e20, @loopback}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000077ffc)) sendto$inet(r1, &(0x7f0000fc2000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) recvfrom(r1, &(0x7f0000db5000), 0xfffffffffffffec1, 0x0, 0x0, 0x6a) 03:33:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f00006f7000)={0x77359400}, &(0x7f0000000000), 0x0) futex(&(0x7f000000cffc), 0x5, 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000080), 0x25000000) 03:33:45 executing program 2: clock_gettime(0x1, &(0x7f00000002c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 349.206907] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 349.254200] audit: type=1326 audit(2000000025.590:7): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10342 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:45 executing program 1: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffc) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000280), &(0x7f0000000100), &(0x7f0000000240)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mkdir(&(0x7f0000000400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 03:33:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000a40)={@dev, @loopback, @empty, 0x0, 0x40, 0x2a9e}) [ 349.451709] 9pnet: Insufficient options for proto=fd 03:33:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000000c0)) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 03:33:45 executing program 0: shmget$private(0x7a, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(0x0, &(0x7f0000ff8000/0x4000)=nil, 0x0) shmdt(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000480)=""/201) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f383066470f3a63cb00bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298c441fd2fe47d") 03:33:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 03:33:46 executing program 5: getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') clock_getres(0x0, &(0x7f00000001c0)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000002c0), 0xfffffcba) pipe2$9p(&(0x7f0000000340), 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a00)) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgid(0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), &(0x7f00000003c0)=0x40) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000200)) syz_execute_func(&(0x7f00000004c0)="42805da0510fef69dc0f0fb9ffefffffbfcece9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f380182b520cdc482b193ac9e0e000000fee60f2e2121010d64ac1e5d31a3b7e2989d") nanosleep(&(0x7f0000000300)={0x77359400}, 0x0) 03:33:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x6, &(0x7f0000000500)=0x0) io_submit(r1, 0x2, &(0x7f00000008c0)=[&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000540)}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000007c0)}]) 03:33:46 executing program 4: keyctl$set_reqkey_keyring(0x7, 0xb000400) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() 03:33:46 executing program 1: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x0, &(0x7f0000000880)=ANY=[], &(0x7f0000000040)) chroot(&(0x7f00000000c0)='./file0\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000900), &(0x7f00000005c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x98) shmget(0xffffffffffffffff, 0x10000, 0x0, &(0x7f0000fee000/0x10000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000001ac0)=""/4096) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000740)) accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000380)=0x1c, 0x0) request_key(&(0x7f0000000340)='id_legacy\x00', &(0x7f0000000540), &(0x7f0000000580)='/dev/urandom\x00', 0xfffffffffffffff8) keyctl$describe(0x6, 0x0, &(0x7f0000000800)=""/76, 0x4c) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000300), 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) getgid() write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000600)={0x90}, 0x90) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:46 executing program 2: clock_gettime(0x1, &(0x7f00000002c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 350.216330] audit: type=1326 audit(2000000026.550:8): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10394 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) open_by_handle_at(r1, &(0x7f0000000040)={0x9, 0x2, '\v'}, 0x0) 03:33:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) open_by_handle_at(r1, &(0x7f0000000040)={0x9, 0x2, '\v'}, 0x0) 03:33:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) open_by_handle_at(r1, &(0x7f0000000040)={0x9, 0x2, '\v'}, 0x0) 03:33:46 executing program 0: msgget(0x0, 0x0) getuid() getresgid(&(0x7f0000000180), &(0x7f0000000480), &(0x7f0000000680)) getgroups(0x0, &(0x7f0000000700)) getuid() getgid() gettid() gettid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000200)) eventfd(0x0) inotify_init() seccomp(0x1, 0x0, &(0x7f0000002200)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) msgctl$IPC_RMID(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) add_key(&(0x7f00000006c0)='blacklist\x00', &(0x7f00000001c0), 0x0, 0xc8, 0xfffffffffffffff8) request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340), &(0x7f00000004c0)='rxrpc\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000640)='big_key\x00', &(0x7f0000000800), &(0x7f00000009c0), 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f0000000440)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000400)='*#(-nodev@\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() memfd_create(&(0x7f0000000080)='\\md5sum-\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000c00)=ANY=[]) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000380), 0x4) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x351}, 0x28) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000100)=0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000900)=@buf={0x0, &(0x7f00000008c0)}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:46 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000001180)='threaded\x00', 0xfc9a) sync_file_range(r0, 0x8001, 0x0, 0x7) fallocate(r0, 0x0, 0x0, 0x10001) fallocate(r0, 0x3, 0x5e00, 0x2cbd) 03:33:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) open_by_handle_at(r1, &(0x7f0000000040)={0x9, 0x2, '\v'}, 0x0) 03:33:47 executing program 5: getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') clock_getres(0x0, &(0x7f00000001c0)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000002c0), 0xfffffcba) pipe2$9p(&(0x7f0000000340), 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a00)) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgid(0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), &(0x7f00000003c0)=0x40) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000200)) syz_execute_func(&(0x7f00000004c0)="42805da0510fef69dc0f0fb9ffefffffbfcece9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f380182b520cdc482b193ac9e0e000000fee60f2e2121010d64ac1e5d31a3b7e2989d") nanosleep(&(0x7f0000000300)={0x77359400}, 0x0) 03:33:47 executing program 3: r0 = add_key(&(0x7f0000002000)='logon\x00', &(0x7f0000001000), &(0x7f0000001000)="1c989cc9f58ec796be4720e6160291a2fb7c6445e84b8e9e349ead029fe38d5810bf992b5d51f406a51cc339021268aed6f767582af42dbc8ea1110e4353fcf30b20f1f27ed3b44bef6444f8ca6a808e34ded636ef55e151c11b4ef7a5384f4a0ceb885759dfeeca5aaa540de461d2130755897533032f5639c4ba79988a49d63084f2cbed0a84e5e733146f15192fdabd0e3a", 0x93, 0xfffffffffffffffc) keyctl$read(0xb, r0, &(0x7f0000000000)=""/169, 0xa9) 03:33:47 executing program 3: mmap(&(0x7f00000a1000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000f6bfe8)) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x800000}, 0x200000}) 03:33:47 executing program 4: keyctl$set_reqkey_keyring(0x7, 0xb000400) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() 03:33:47 executing program 1: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:47 executing program 3: memfd_create(&(0x7f0000000180)='/dev/snapshot\x00', 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000200)={0x0, @aes128, 0x0, "4c4b48b5bde88e3d"}) gettid() perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x200000f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:47 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="260000005e0009000000eaf83a0000000000000001000000ffffff000008db1ee9ff4435eade", 0x26) 03:33:47 executing program 5: getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') clock_getres(0x0, &(0x7f00000001c0)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000002c0), 0xfffffcba) pipe2$9p(&(0x7f0000000340), 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a00)) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgid(0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), &(0x7f00000003c0)=0x40) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000200)) syz_execute_func(&(0x7f00000004c0)="42805da0510fef69dc0f0fb9ffefffffbfcece9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f380182b520cdc482b193ac9e0e000000fee60f2e2121010d64ac1e5d31a3b7e2989d") nanosleep(&(0x7f0000000300)={0x77359400}, 0x0) 03:33:47 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xc, 0x1) ioctl$TIOCGSID(r0, 0x8108551b, &(0x7f0000000080)) [ 351.141937] audit: type=1326 audit(2000000027.470:9): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10443 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:48 executing program 0: r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x1ff, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x12001, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180)}, 0x4400}, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000004, 0x11, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x1fad, 0x9, 0xffffffffffffff9c, 0x80000001}, 0x2c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 03:33:48 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000300)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000380)) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000140)="42805da0c60fef69dc0f01eece410fbaff5719fa380f38ac2121f3f081768cc8000000c4d181b5e5bc6b1000002121f00fbab204000000ca650f38c812dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000400)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_to_bridge\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f0000000480)=0x14) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) 03:33:48 executing program 5: getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') clock_getres(0x0, &(0x7f00000001c0)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000002c0), 0xfffffcba) pipe2$9p(&(0x7f0000000340), 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a00)) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgid(0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), &(0x7f00000003c0)=0x40) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000200)) syz_execute_func(&(0x7f00000004c0)="42805da0510fef69dc0f0fb9ffefffffbfcece9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f380182b520cdc482b193ac9e0e000000fee60f2e2121010d64ac1e5d31a3b7e2989d") nanosleep(&(0x7f0000000300)={0x77359400}, 0x0) 03:33:48 executing program 4: keyctl$set_reqkey_keyring(0x7, 0xb000400) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() 03:33:48 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:48 executing program 3: futex(&(0x7f0000000040), 0xc, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) [ 352.112480] audit: type=1326 audit(2000000028.440:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10470 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 352.185079] audit: type=1326 audit(2000000028.520:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10474 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:48 executing program 0: futex(&(0x7f0000000040), 0xc, 0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001dc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001f00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f40)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000002040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002080)={@multicast2, @dev}, &(0x7f00000020c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002140)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002300), &(0x7f0000002340)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002440)={0x0, @remote, @local}, &(0x7f0000002480)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000480), 0xc, &(0x7f00000028c0)={&(0x7f00000024c0)={0x14}, 0x14}}, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) fstat(0xffffffffffffffff, &(0x7f0000001080)) fstat(0xffffffffffffff9c, &(0x7f0000001100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getgroups(0x0, &(0x7f0000001200)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000001240)=ANY=[], 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @dev, 'lo\x00'}}, 0x1e) r0 = accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14, 0x800) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000200)={0x0, 0x1, 0x6, @broadcast}, 0x10) listen(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) getuid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002a00)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x3000400}, 0xc, &(0x7f0000002980)=[{&(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x1}], 0x1, &(0x7f00000029c0)}, 0x4000080) write$binfmt_misc(r1, &(0x7f0000000440)={'syz1'}, 0x1200e) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000000880)=[{&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000780)=""/203, 0xcb}], 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') seccomp(0x1, 0x1, &(0x7f0000028ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x407ffffffd}]}) 03:33:49 executing program 5: capset(&(0x7f0000b3e000)={0x19980330}, &(0x7f0000f21fe8)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x3, @broadcast}, 0x10) 03:33:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000002c0)=""/206) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='bridge_slave_0\x00'}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L-', 0x6}, 0x28, 0x0) getuid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000300)) fstat(0xffffffffffffffff, &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000007c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000240)={0x7}, 0x7) 03:33:49 executing program 2: keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0xc) add_key(&(0x7f0000001940)='id_legacy\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfe}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100)=0x4, 0x4) r1 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)="15881b0cd879288200cd7b215a123b100afb9b5fba8cca9635febbe668e7282ccac73a123833731f1b40e4", 0x2b, 0xfffffffffffffffa) keyctl$describe(0x6, r1, &(0x7f0000000500)=""/56, 0x38) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x15469}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000002200010000000000f8ff00000427000008000c00", @ANYRES32=0x0], 0x2}}, 0x0) r2 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000380)) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x2c) bind$unix(0xffffffffffffffff, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7, 0x80) connect$bt_l2cap(r3, &(0x7f00000001c0)={0x1f, 0xbdb7, {0x0, 0x6, 0x8, 0xce, 0x4, 0x7fffffff}, 0x40, 0x3ff}, 0xe) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000240)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') 03:33:49 executing program 3: futex(&(0x7f0000000040), 0xc, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) 03:33:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @dev, 'lo\x00'}}, 0x1e) r0 = accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14, 0x800) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000200)={0x0, 0x1, 0x6, @broadcast}, 0x10) listen(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) getuid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002a00)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x3000400}, 0xc, &(0x7f0000002980)=[{&(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x1}], 0x1, &(0x7f00000029c0)}, 0x4000080) write$binfmt_misc(r1, &(0x7f0000000440)={'syz1'}, 0x1200e) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000000880)=[{&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000780)=""/203, 0xcb}], 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') seccomp(0x1, 0x1, &(0x7f0000028ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x407ffffffd}]}) 03:33:49 executing program 0: futex(&(0x7f0000000040), 0xc, 0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001dc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001f00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f40)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000002040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002080)={@multicast2, @dev}, &(0x7f00000020c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002140)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002300), &(0x7f0000002340)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002440)={0x0, @remote, @local}, &(0x7f0000002480)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000480), 0xc, &(0x7f00000028c0)={&(0x7f00000024c0)={0x14}, 0x14}}, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) fstat(0xffffffffffffffff, &(0x7f0000001080)) fstat(0xffffffffffffff9c, &(0x7f0000001100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getgroups(0x0, &(0x7f0000001200)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000001240)=ANY=[], 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfe}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100)=0x4, 0x4) r1 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)="15881b0cd879288200cd7b215a123b100afb9b5fba8cca9635febbe668e7282ccac73a123833731f1b40e4", 0x2b, 0xfffffffffffffffa) keyctl$describe(0x6, r1, &(0x7f0000000500)=""/56, 0x38) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x15469}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000002200010000000000f8ff00000427000008000c00", @ANYRES32=0x0], 0x2}}, 0x0) r2 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000380)) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x2c) bind$unix(0xffffffffffffffff, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7, 0x80) connect$bt_l2cap(r3, &(0x7f00000001c0)={0x1f, 0xbdb7, {0x0, 0x6, 0x8, 0xce, 0x4, 0x7fffffff}, 0x40, 0x3ff}, 0xe) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000240)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') 03:33:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @dev, 'lo\x00'}}, 0x1e) r0 = accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14, 0x800) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000200)={0x0, 0x1, 0x6, @broadcast}, 0x10) listen(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) getuid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002a00)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x3000400}, 0xc, &(0x7f0000002980)=[{&(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x1}], 0x1, &(0x7f00000029c0)}, 0x4000080) write$binfmt_misc(r1, &(0x7f0000000440)={'syz1'}, 0x1200e) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000000880)=[{&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000780)=""/203, 0xcb}], 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') seccomp(0x1, 0x1, &(0x7f0000028ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x407ffffffd}]}) 03:33:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfe}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100)=0x4, 0x4) r1 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)="15881b0cd879288200cd7b215a123b100afb9b5fba8cca9635febbe668e7282ccac73a123833731f1b40e4", 0x2b, 0xfffffffffffffffa) keyctl$describe(0x6, r1, &(0x7f0000000500)=""/56, 0x38) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x15469}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000002200010000000000f8ff00000427000008000c00", @ANYRES32=0x0], 0x2}}, 0x0) r2 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000380)) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x2c) bind$unix(0xffffffffffffffff, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7, 0x80) connect$bt_l2cap(r3, &(0x7f00000001c0)={0x1f, 0xbdb7, {0x0, 0x6, 0x8, 0xce, 0x4, 0x7fffffff}, 0x40, 0x3ff}, 0xe) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000240)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') 03:33:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfe}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100)=0x4, 0x4) r1 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)="15881b0cd879288200cd7b215a123b100afb9b5fba8cca9635febbe668e7282ccac73a123833731f1b40e4", 0x2b, 0xfffffffffffffffa) keyctl$describe(0x6, r1, &(0x7f0000000500)=""/56, 0x38) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x15469}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000002200010000000000f8ff00000427000008000c00", @ANYRES32=0x0], 0x2}}, 0x0) r2 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000380)) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x2c) bind$unix(0xffffffffffffffff, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7, 0x80) connect$bt_l2cap(r3, &(0x7f00000001c0)={0x1f, 0xbdb7, {0x0, 0x6, 0x8, 0xce, 0x4, 0x7fffffff}, 0x40, 0x3ff}, 0xe) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000240)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') 03:33:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @dev, 'lo\x00'}}, 0x1e) r0 = accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14, 0x800) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000200)={0x0, 0x1, 0x6, @broadcast}, 0x10) listen(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) getuid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002a00)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x3000400}, 0xc, &(0x7f0000002980)=[{&(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x1}], 0x1, &(0x7f00000029c0)}, 0x4000080) write$binfmt_misc(r1, &(0x7f0000000440)={'syz1'}, 0x1200e) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000000880)=[{&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000780)=""/203, 0xcb}], 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') seccomp(0x1, 0x1, &(0x7f0000028ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x407ffffffd}]}) 03:33:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000002c0)=""/206) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='bridge_slave_0\x00'}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L-', 0x6}, 0x28, 0x0) getuid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000300)) fstat(0xffffffffffffffff, &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000007c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000240)={0x7}, 0x7) 03:33:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfe}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100)=0x4, 0x4) r1 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)="15881b0cd879288200cd7b215a123b100afb9b5fba8cca9635febbe668e7282ccac73a123833731f1b40e4", 0x2b, 0xfffffffffffffffa) keyctl$describe(0x6, r1, &(0x7f0000000500)=""/56, 0x38) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x15469}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000002200010000000000f8ff00000427000008000c00", @ANYRES32=0x0], 0x2}}, 0x0) r2 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000380)) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x2c) bind$unix(0xffffffffffffffff, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7, 0x80) connect$bt_l2cap(r3, &(0x7f00000001c0)={0x1f, 0xbdb7, {0x0, 0x6, 0x8, 0xce, 0x4, 0x7fffffff}, 0x40, 0x3ff}, 0xe) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000240)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') 03:33:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @dev, 'lo\x00'}}, 0x1e) r0 = accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14, 0x800) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000200)={0x0, 0x1, 0x6, @broadcast}, 0x10) listen(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) getuid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002a00)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x3000400}, 0xc, &(0x7f0000002980)=[{&(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x1}], 0x1, &(0x7f00000029c0)}, 0x4000080) write$binfmt_misc(r1, &(0x7f0000000440)={'syz1'}, 0x1200e) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000000880)=[{&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000780)=""/203, 0xcb}], 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') seccomp(0x1, 0x1, &(0x7f0000028ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x407ffffffd}]}) 03:33:50 executing program 3: futex(&(0x7f0000000040), 0xc, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) 03:33:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @dev, 'lo\x00'}}, 0x1e) r0 = accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14, 0x800) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000200)={0x0, 0x1, 0x6, @broadcast}, 0x10) listen(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) getuid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002a00)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x3000400}, 0xc, &(0x7f0000002980)=[{&(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x1}], 0x1, &(0x7f00000029c0)}, 0x4000080) write$binfmt_misc(r1, &(0x7f0000000440)={'syz1'}, 0x1200e) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000000880)=[{&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000780)=""/203, 0xcb}], 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') seccomp(0x1, 0x1, &(0x7f0000028ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x407ffffffd}]}) 03:33:50 executing program 0: futex(&(0x7f0000000040), 0xc, 0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001dc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001f00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f40)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000002040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002080)={@multicast2, @dev}, &(0x7f00000020c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002140)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002300), &(0x7f0000002340)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002440)={0x0, @remote, @local}, &(0x7f0000002480)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000480), 0xc, &(0x7f00000028c0)={&(0x7f00000024c0)={0x14}, 0x14}}, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) fstat(0xffffffffffffffff, &(0x7f0000001080)) fstat(0xffffffffffffff9c, &(0x7f0000001100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getgroups(0x0, &(0x7f0000001200)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000001240)=ANY=[], 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x8000000002, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYBLOB='#'], 0x1) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x87f}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xa}) 03:33:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfe}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100)=0x4, 0x4) r1 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)="15881b0cd879288200cd7b215a123b100afb9b5fba8cca9635febbe668e7282ccac73a123833731f1b40e4", 0x2b, 0xfffffffffffffffa) keyctl$describe(0x6, r1, &(0x7f0000000500)=""/56, 0x38) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x15469}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000002200010000000000f8ff00000427000008000c00", @ANYRES32=0x0], 0x2}}, 0x0) r2 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000380)) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x2c) bind$unix(0xffffffffffffffff, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7, 0x80) connect$bt_l2cap(r3, &(0x7f00000001c0)={0x1f, 0xbdb7, {0x0, 0x6, 0x8, 0xce, 0x4, 0x7fffffff}, 0x40, 0x3ff}, 0xe) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000240)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') 03:33:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @dev, 'lo\x00'}}, 0x1e) r0 = accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14, 0x800) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000200)={0x0, 0x1, 0x6, @broadcast}, 0x10) listen(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) getuid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002a00)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x3000400}, 0xc, &(0x7f0000002980)=[{&(0x7f0000000500)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x1}], 0x1, &(0x7f00000029c0)}, 0x4000080) write$binfmt_misc(r1, &(0x7f0000000440)={'syz1'}, 0x1200e) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000000880)=[{&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000000780)=""/203, 0xcb}], 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') seccomp(0x1, 0x1, &(0x7f0000028ff0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x407ffffffd}]}) 03:33:50 executing program 4: creat(&(0x7f00000001c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000500)='system.posix_acl_access\x00', &(0x7f0000000e00), 0x24, 0x0) memfd_create(&(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000001c0)) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000040), 0xc, &(0x7f0000000900)={&(0x7f0000000800)=ANY=[]}}, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000740)={0x0, &(0x7f0000000700)}) linkat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000400)=@pppol2tpv3, &(0x7f0000000480)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006680)={{{@in=@multicast1, @in=@broadcast}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f0000006780)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000a0c0), 0x0, 0x0, &(0x7f000000a140)) accept$packet(0xffffffffffffffff, &(0x7f000000a200), &(0x7f000000a240)=0x14) getpeername(0xffffffffffffffff, &(0x7f000000a280)=@xdp, &(0x7f000000a300)=0x80) recvmsg(0xffffffffffffffff, &(0x7f000000a900)={&(0x7f000000a340)=@can, 0x80, &(0x7f000000a840), 0x0, &(0x7f000000a8c0)=""/56, 0x38}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a940)={{{@in, @in=@local}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f000000aa40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f000000ab80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000abc0)={@loopback}, &(0x7f000000ac00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac40)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f000000ad40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ae40)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000af40)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b040)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f000000b140)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000b240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b280)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b2c0)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f000000b3c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000b400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000b440)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000010300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000010380)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000103c0)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@broadcast}}, &(0x7f00000104c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000010540)={{{@in, @in=@multicast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000010640)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010680)={@mcast2}, &(0x7f00000106c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000010700)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000010800)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000010840)={@local, @multicast1}, &(0x7f0000010880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000109c0)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000010ac0)=0xe8) getsockname(0xffffffffffffffff, &(0x7f0000010b00)=@ll, &(0x7f0000010b80)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000011f80)={{{@in=@multicast2, @in6}}, {{@in6=@loopback}}}, &(0x7f0000012080)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000012980)={&(0x7f0000000780), 0xc, &(0x7f0000012940)={&(0x7f00000120c0)={0x14}, 0x14}}, 0x0) open$dir(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfe}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000100)=0x4, 0x4) r1 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)="15881b0cd879288200cd7b215a123b100afb9b5fba8cca9635febbe668e7282ccac73a123833731f1b40e4", 0x2b, 0xfffffffffffffffa) keyctl$describe(0x6, r1, &(0x7f0000000500)=""/56, 0x38) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0x15469}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000002200010000000000f8ff00000427000008000c00", @ANYRES32=0x0], 0x2}}, 0x0) r2 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000380)) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x2c) bind$unix(0xffffffffffffffff, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7, 0x80) connect$bt_l2cap(r3, &(0x7f00000001c0)={0x1f, 0xbdb7, {0x0, 0x6, 0x8, 0xce, 0x4, 0x7fffffff}, 0x40, 0x3ff}, 0xe) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000240)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') 03:33:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="02004200000001000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 03:33:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000002c0)=""/206) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='bridge_slave_0\x00'}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L-', 0x6}, 0x28, 0x0) getuid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000300)) fstat(0xffffffffffffffff, &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000007c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000240)={0x7}, 0x7) 03:33:51 executing program 5: mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$pfkey(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000880)) pipe(&(0x7f00000008c0)) accept$inet6(0xffffffffffffff9c, &(0x7f0000000900)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000940)=0x1c) accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000980)='net/bnep\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) getpid() wait4(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000480)=0xe8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@mcast2, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, 0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000180)={0x90}, 0x90) rt_sigqueueinfo(0x0, 0x0, &(0x7f00000009c0)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000600)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") getpgrp(0x0) 03:33:51 executing program 2: clock_gettime(0x9, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:51 executing program 3: futex(&(0x7f0000000040), 0xc, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) 03:33:51 executing program 0: futex(&(0x7f0000000040), 0xc, 0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001dc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001f00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f40)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000002040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002080)={@multicast2, @dev}, &(0x7f00000020c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002140)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002300), &(0x7f0000002340)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002440)={0x0, @remote, @local}, &(0x7f0000002480)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000480), 0xc, &(0x7f00000028c0)={&(0x7f00000024c0)={0x14}, 0x14}}, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) fstat(0xffffffffffffffff, &(0x7f0000001080)) fstat(0xffffffffffffff9c, &(0x7f0000001100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getgroups(0x0, &(0x7f0000001200)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000001240)=ANY=[], 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:51 executing program 4: creat(&(0x7f00000001c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000500)='system.posix_acl_access\x00', &(0x7f0000000e00), 0x24, 0x0) memfd_create(&(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000001c0)) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000040), 0xc, &(0x7f0000000900)={&(0x7f0000000800)=ANY=[]}}, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000740)={0x0, &(0x7f0000000700)}) linkat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000400)=@pppol2tpv3, &(0x7f0000000480)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006680)={{{@in=@multicast1, @in=@broadcast}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f0000006780)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000a0c0), 0x0, 0x0, &(0x7f000000a140)) accept$packet(0xffffffffffffffff, &(0x7f000000a200), &(0x7f000000a240)=0x14) getpeername(0xffffffffffffffff, &(0x7f000000a280)=@xdp, &(0x7f000000a300)=0x80) recvmsg(0xffffffffffffffff, &(0x7f000000a900)={&(0x7f000000a340)=@can, 0x80, &(0x7f000000a840), 0x0, &(0x7f000000a8c0)=""/56, 0x38}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a940)={{{@in, @in=@local}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f000000aa40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f000000ab80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000abc0)={@loopback}, &(0x7f000000ac00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac40)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f000000ad40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ae40)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000af40)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b040)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f000000b140)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000b240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b280)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b2c0)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f000000b3c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000b400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000b440)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000010300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000010380)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000103c0)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@broadcast}}, &(0x7f00000104c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000010540)={{{@in, @in=@multicast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000010640)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010680)={@mcast2}, &(0x7f00000106c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000010700)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000010800)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000010840)={@local, @multicast1}, &(0x7f0000010880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000109c0)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000010ac0)=0xe8) getsockname(0xffffffffffffffff, &(0x7f0000010b00)=@ll, &(0x7f0000010b80)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000011f80)={{{@in=@multicast2, @in6}}, {{@in6=@loopback}}}, &(0x7f0000012080)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000012980)={&(0x7f0000000780), 0xc, &(0x7f0000012940)={&(0x7f00000120c0)={0x14}, 0x14}}, 0x0) open$dir(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:52 executing program 5: clone(0x7fd, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x0, 0x1ffffffffffffe, 0x0, 0x0}, 0x2c) 03:33:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000002c0)=""/206) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='bridge_slave_0\x00'}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L-', 0x6}, 0x28, 0x0) getuid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000300)) fstat(0xffffffffffffffff, &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000007c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000240)={0x7}, 0x7) 03:33:52 executing program 5: semget(0xffffffffffffffff, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@remote, @in=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000200)) geteuid() getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000ac0)) socket$key(0xf, 0x3, 0x2) shutdown(0xffffffffffffffff, 0x0) gettid() capget(&(0x7f0000000080), &(0x7f0000000140)) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) fstat(0xffffffffffffffff, &(0x7f0000000480)) getgid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@remote}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000940)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@mcast2, @in6}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000024c0)=0xe8) 03:33:52 executing program 2: nanosleep(&(0x7f0000000040), 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) eventfd(0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") 03:33:52 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000280), &(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x3, 0x0) mount(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='cifs\x00', 0x81002b, &(0x7f0000000240)) 03:33:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x10000000000000b1) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x6, 0x0, [0x12, 0x1]}) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) 03:33:52 executing program 3: shmget(0x3, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) getgid() setfsgid(0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x200000f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000500)={0x78}, 0x78) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) fgetxattr(0xffffffffffffffff, &(0x7f0000000440)=@known='security.evm\x00', &(0x7f0000000580)=""/156, 0x9c) accept$unix(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000140)=0x6e) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x10) 03:33:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x10000000000000b1) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x6, 0x0, [0x12, 0x1]}) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:52 executing program 4: creat(&(0x7f00000001c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000500)='system.posix_acl_access\x00', &(0x7f0000000e00), 0x24, 0x0) memfd_create(&(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000001c0)) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000040), 0xc, &(0x7f0000000900)={&(0x7f0000000800)=ANY=[]}}, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000740)={0x0, &(0x7f0000000700)}) linkat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000400)=@pppol2tpv3, &(0x7f0000000480)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006680)={{{@in=@multicast1, @in=@broadcast}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f0000006780)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000a0c0), 0x0, 0x0, &(0x7f000000a140)) accept$packet(0xffffffffffffffff, &(0x7f000000a200), &(0x7f000000a240)=0x14) getpeername(0xffffffffffffffff, &(0x7f000000a280)=@xdp, &(0x7f000000a300)=0x80) recvmsg(0xffffffffffffffff, &(0x7f000000a900)={&(0x7f000000a340)=@can, 0x80, &(0x7f000000a840), 0x0, &(0x7f000000a8c0)=""/56, 0x38}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a940)={{{@in, @in=@local}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f000000aa40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f000000ab80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000abc0)={@loopback}, &(0x7f000000ac00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac40)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f000000ad40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ae40)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000af40)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b040)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f000000b140)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000b240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b280)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b2c0)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f000000b3c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000b400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000b440)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000010300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000010380)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000103c0)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@broadcast}}, &(0x7f00000104c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000010540)={{{@in, @in=@multicast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000010640)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010680)={@mcast2}, &(0x7f00000106c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000010700)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000010800)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000010840)={@local, @multicast1}, &(0x7f0000010880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000109c0)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000010ac0)=0xe8) getsockname(0xffffffffffffffff, &(0x7f0000010b00)=@ll, &(0x7f0000010b80)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000011f80)={{{@in=@multicast2, @in6}}, {{@in6=@loopback}}}, &(0x7f0000012080)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000012980)={&(0x7f0000000780), 0xc, &(0x7f0000012940)={&(0x7f00000120c0)={0x14}, 0x14}}, 0x0) open$dir(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x10000000000000b1) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x6, 0x0, [0x12, 0x1]}) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:53 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000840)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt(r1, 0x100005, 0x80010000, &(0x7f0000000300)="41cab3b6b7db3f37e27575233aa3868b851a3f5eea84cbe86687fe9b570626ef049d30e186bde9c4aa0c72d385a4cf8125b7945e4e4f9d7ba8cea85d9b596503089b888839ca83efd408250b41542c650fadd8b36ac4020000d55fd2f5bfd5b327c52860e81d9c421477ee1797980a7b170651a27fba3c6fb4b7381c328a5e109e500dfeb360f1c75ef034f5f8ad53e763308054a056375f047fb82fb9cea684a2566e2e147073ff2179de52c2e39b3f4d0234f846e7918f597b2b4cc8c1", 0xbe) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000280), &(0x7f00000002c0)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/cuse\x00', 0x2500, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x2, 0x4, 0x1, 0xc70, 0x4}, 0x2c) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x20000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r5, 0xae04) ioctl$GIO_FONTX(r3, 0x4b6b, &(0x7f0000000740)=""/242) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000540)=ANY=[@ANYBLOB="1414bb01000000200000000002f2ddffffffffac14141219da7316d4e2a4977f2212946b8b55da7a1e46182a93b5564c39724e1b90a5000000000000000000000000"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r7, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000440)=""/17, 0x100000, 0x1001}, 0x18) bind$xdp(r7, &(0x7f0000000300)={0x2c, 0x1, r6, 0x0, 0xffffffffffffff9c}, 0x10) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f00000000c0)={0x3, 0x3}) write$P9_RREMOVE(r7, &(0x7f00000001c0)={0x7, 0x7b, 0x2}, 0x7) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)="2e2f6367726f75d9b6a30000008000000000", 0x1ff) fstat(r7, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r8) io_setup(0x0, &(0x7f0000000380)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6370752f2e797a31ff", 0x1ff) 03:33:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1fffff, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@local}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in6, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0), 0x0, &(0x7f0000000e00)}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000400), &(0x7f00000003c0)=0xffffffffffffffae) getgid() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)) 03:33:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x10000000000000b1) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x6, 0x0, [0x12, 0x1]}) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:53 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc1205531, &(0x7f0000000100)={0x0, 0x1000000}) 03:33:53 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000840)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt(r1, 0x100005, 0x80010000, &(0x7f0000000300)="41cab3b6b7db3f37e27575233aa3868b851a3f5eea84cbe86687fe9b570626ef049d30e186bde9c4aa0c72d385a4cf8125b7945e4e4f9d7ba8cea85d9b596503089b888839ca83efd408250b41542c650fadd8b36ac4020000d55fd2f5bfd5b327c52860e81d9c421477ee1797980a7b170651a27fba3c6fb4b7381c328a5e109e500dfeb360f1c75ef034f5f8ad53e763308054a056375f047fb82fb9cea684a2566e2e147073ff2179de52c2e39b3f4d0234f846e7918f597b2b4cc8c1", 0xbe) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000280), &(0x7f00000002c0)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/cuse\x00', 0x2500, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x2, 0x4, 0x1, 0xc70, 0x4}, 0x2c) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x20000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r5, 0xae04) ioctl$GIO_FONTX(r3, 0x4b6b, &(0x7f0000000740)=""/242) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000540)=ANY=[@ANYBLOB="1414bb01000000200000000002f2ddffffffffac14141219da7316d4e2a4977f2212946b8b55da7a1e46182a93b5564c39724e1b90a5000000000000000000000000"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r7, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000440)=""/17, 0x100000, 0x1001}, 0x18) bind$xdp(r7, &(0x7f0000000300)={0x2c, 0x1, r6, 0x0, 0xffffffffffffff9c}, 0x10) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f00000000c0)={0x3, 0x3}) write$P9_RREMOVE(r7, &(0x7f00000001c0)={0x7, 0x7b, 0x2}, 0x7) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)="2e2f6367726f75d9b6a30000008000000000", 0x1ff) fstat(r7, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r8) io_setup(0x0, &(0x7f0000000380)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6370752f2e797a31ff", 0x1ff) 03:33:53 executing program 2: getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000300)) epoll_create1(0x0) epoll_create1(0x0) close(0xffffffffffffffff) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000c85000)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/5, 0x5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f470f3800c4c439582a060f38211a40a5c19084d98fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e298673640dfc2c4837d4b6d0500") 03:33:53 executing program 0: munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[]}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000400), 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[]}}, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffff9) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@local, @in=@multicast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast1}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000780)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@dev}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in=@broadcast, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000bc0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000d00)=0xe8) getresuid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6=@loopback, @in6}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000fc0)=0xe8) getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getresgid(&(0x7f0000001140), &(0x7f0000001180), &(0x7f00000011c0)) getresgid(&(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280)) fstat(0xffffffffffffffff, &(0x7f00000012c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001340), &(0x7f0000001380)=0xc) stat(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_access\x00', &(0x7f0000001480), 0x24, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000280), &(0x7f0000000600), 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.redirect\x00', &(0x7f00000004c0)='./file0\x00', 0x8, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:53 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000840)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt(r1, 0x100005, 0x80010000, &(0x7f0000000300)="41cab3b6b7db3f37e27575233aa3868b851a3f5eea84cbe86687fe9b570626ef049d30e186bde9c4aa0c72d385a4cf8125b7945e4e4f9d7ba8cea85d9b596503089b888839ca83efd408250b41542c650fadd8b36ac4020000d55fd2f5bfd5b327c52860e81d9c421477ee1797980a7b170651a27fba3c6fb4b7381c328a5e109e500dfeb360f1c75ef034f5f8ad53e763308054a056375f047fb82fb9cea684a2566e2e147073ff2179de52c2e39b3f4d0234f846e7918f597b2b4cc8c1", 0xbe) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000280), &(0x7f00000002c0)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/cuse\x00', 0x2500, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x2, 0x4, 0x1, 0xc70, 0x4}, 0x2c) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x20000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r5, 0xae04) ioctl$GIO_FONTX(r3, 0x4b6b, &(0x7f0000000740)=""/242) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000540)=ANY=[@ANYBLOB="1414bb01000000200000000002f2ddffffffffac14141219da7316d4e2a4977f2212946b8b55da7a1e46182a93b5564c39724e1b90a5000000000000000000000000"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r7, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000440)=""/17, 0x100000, 0x1001}, 0x18) bind$xdp(r7, &(0x7f0000000300)={0x2c, 0x1, r6, 0x0, 0xffffffffffffff9c}, 0x10) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f00000000c0)={0x3, 0x3}) write$P9_RREMOVE(r7, &(0x7f00000001c0)={0x7, 0x7b, 0x2}, 0x7) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)="2e2f6367726f75d9b6a30000008000000000", 0x1ff) fstat(r7, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r8) io_setup(0x0, &(0x7f0000000380)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6370752f2e797a31ff", 0x1ff) 03:33:53 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000080)=@generic={0x1, 0x0, 0x1}) 03:33:53 executing program 4: creat(&(0x7f00000001c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000500)='system.posix_acl_access\x00', &(0x7f0000000e00), 0x24, 0x0) memfd_create(&(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000001c0)) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000040), 0xc, &(0x7f0000000900)={&(0x7f0000000800)=ANY=[]}}, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000740)={0x0, &(0x7f0000000700)}) linkat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000400)=@pppol2tpv3, &(0x7f0000000480)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006680)={{{@in=@multicast1, @in=@broadcast}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f0000006780)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000a0c0), 0x0, 0x0, &(0x7f000000a140)) accept$packet(0xffffffffffffffff, &(0x7f000000a200), &(0x7f000000a240)=0x14) getpeername(0xffffffffffffffff, &(0x7f000000a280)=@xdp, &(0x7f000000a300)=0x80) recvmsg(0xffffffffffffffff, &(0x7f000000a900)={&(0x7f000000a340)=@can, 0x80, &(0x7f000000a840), 0x0, &(0x7f000000a8c0)=""/56, 0x38}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a940)={{{@in, @in=@local}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f000000aa40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000aa80)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f000000ab80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000abc0)={@loopback}, &(0x7f000000ac00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ac40)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f000000ad40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ae40)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000af40)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b040)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f000000b140)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000b240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b280)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b2c0)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f000000b3c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000b400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000b440)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000010300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000010380)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000103c0)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@broadcast}}, &(0x7f00000104c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000010540)={{{@in, @in=@multicast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000010640)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010680)={@mcast2}, &(0x7f00000106c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000010700)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000010800)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000010840)={@local, @multicast1}, &(0x7f0000010880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000109c0)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000010ac0)=0xe8) getsockname(0xffffffffffffffff, &(0x7f0000010b00)=@ll, &(0x7f0000010b80)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000011f80)={{{@in=@multicast2, @in6}}, {{@in6=@loopback}}}, &(0x7f0000012080)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000012980)={&(0x7f0000000780), 0xc, &(0x7f0000012940)={&(0x7f00000120c0)={0x14}, 0x14}}, 0x0) open$dir(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x0, 0x0, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) r1 = memfd_create(&(0x7f0000000840)="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", 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000180), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="00000000080000000000000000000000c4d981ae211e6951"], 0x1}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in=@rand_addr, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in=@dev={0xac, 0x14, 0x14, 0x11}, @in6=@ipv4={[], [], @loopback}, 0x4e24, 0x0, 0x4e23, 0xa07d, 0xa, 0xd2e26a9d6a60f3c4, 0x20, 0x2f, 0x0, r2}, {0x4, 0x3, 0x831, 0x2000000000, 0x1, 0x5, 0x5, 0x81}, {0x401, 0x7, 0x8, 0x7ee}, 0x8, 0x6e6bbc, 0x1, 0x1, 0x3}, {{@in6=@remote, 0x4d3}, 0xa, @in6=@mcast2, 0x3503, 0x2, 0x1, 0x2, 0x0, 0x7, 0xe7c6}}, 0xe8) r3 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e173dc73ba964a4189007c7c40db8fb4b64dd8ec4d366") epoll_create(0x4) fcntl$setstatus(r3, 0x4, 0x4000) sendfile(r1, r3, &(0x7f0000000040), 0x1080000010) 03:33:53 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000840)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt(r1, 0x100005, 0x80010000, &(0x7f0000000300)="41cab3b6b7db3f37e27575233aa3868b851a3f5eea84cbe86687fe9b570626ef049d30e186bde9c4aa0c72d385a4cf8125b7945e4e4f9d7ba8cea85d9b596503089b888839ca83efd408250b41542c650fadd8b36ac4020000d55fd2f5bfd5b327c52860e81d9c421477ee1797980a7b170651a27fba3c6fb4b7381c328a5e109e500dfeb360f1c75ef034f5f8ad53e763308054a056375f047fb82fb9cea684a2566e2e147073ff2179de52c2e39b3f4d0234f846e7918f597b2b4cc8c1", 0xbe) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000280), &(0x7f00000002c0)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/cuse\x00', 0x2500, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x2, 0x4, 0x1, 0xc70, 0x4}, 0x2c) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x20000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r5, 0xae04) ioctl$GIO_FONTX(r3, 0x4b6b, &(0x7f0000000740)=""/242) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000540)=ANY=[@ANYBLOB="1414bb01000000200000000002f2ddffffffffac14141219da7316d4e2a4977f2212946b8b55da7a1e46182a93b5564c39724e1b90a5000000000000000000000000"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r7, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000440)=""/17, 0x100000, 0x1001}, 0x18) bind$xdp(r7, &(0x7f0000000300)={0x2c, 0x1, r6, 0x0, 0xffffffffffffff9c}, 0x10) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f00000000c0)={0x3, 0x3}) write$P9_RREMOVE(r7, &(0x7f00000001c0)={0x7, 0x7b, 0x2}, 0x7) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)="2e2f6367726f75d9b6a30000008000000000", 0x1ff) fstat(r7, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r8) io_setup(0x0, &(0x7f0000000380)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6370752f2e797a31ff", 0x1ff) 03:33:54 executing program 1: nanosleep(&(0x7f0000000040), 0x0) eventfd(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f00000000c0)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f00000005c0)='\x00', 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000600), 0x0) clock_gettime(0x0, &(0x7f0000000580)) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @local, @multicast2}, &(0x7f00000004c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000009c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000b80)=0xe8) getsockname(0xffffffffffffffff, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001340)={{{@in6=@remote, @in6}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000001440)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000014c0)=0x14) syslog(0x0, &(0x7f00000002c0)=""/162, 0xa2) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000000180), 0xc, &(0x7f00000018c0)={&(0x7f0000001500)={0x14}, 0x14}}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000600)) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000540)={0x14}, 0x14) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000380)) connect$inet6(0xffffffffffffffff, &(0x7f0000000440)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)={@mcast2}, &(0x7f0000000400)=0x14) 03:33:54 executing program 5: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) pipe2(&(0x7f0000000140), 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000240)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getpid() getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000008c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) getresgid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000b40)=0xe8) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) openat$full(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/full\x00', 0x0, 0x0) getpgid(0x0) getuid() stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000f80)={{{@in=@remote}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000001080)=0xe8) stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000001200)) getgid() gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0), &(0x7f0000001500)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001900), &(0x7f0000001940)=0xc) lstat(&(0x7f0000001980)='./file0\x00', &(0x7f00000019c0)) getgid() getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a40)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001b40)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001b80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@remote, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000001d40)) getpid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) stat(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f00)) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:54 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x8000000000000806, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x2000000000001}, 0x8) close(r1) 03:33:54 executing program 2: inotify_init1(0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f00000002c0), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000600)=ANY=[]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000740)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da01245cf0f01eece73fe470f006f92380f8ac469df1af3f081768cc8000601c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541f20f38f01a0f2e1ad6fb0703") 03:33:54 executing program 5: socket$inet6(0xa, 0x5, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) r0 = getpid() r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) ioctl$KVM_SET_TSC_KHZ(r1, 0xc0185502, 0x0) 03:33:54 executing program 4: mkdir(&(0x7f0000000200)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000000c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f00000002c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0xffffffffffffffff, &(0x7f0000000340)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00") add_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0), &(0x7f0000000140), 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000700), 0x0, 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@multicast1, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}}}, &(0x7f00000004c0)=0xe8) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000500)={0x0, 0x0, 0x2ff, &(0x7f0000000480)}) request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280), &(0x7f0000000040)='-\x00', 0xfffffffffffffffb) io_setup(0x0, &(0x7f00000002c0)) io_cancel(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000700)}, &(0x7f0000000780)) keyctl$get_persistent(0x16, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001440)={@local}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000140)=0xe8) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0510fef69dc0f01ee0dce41cbff91dd91913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in6=@remote, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000640)=0xe8) [ 358.324933] syz-executor3 (10715) used greatest stack depth: 12488 bytes left 03:33:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x0, 0x0, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) r1 = memfd_create(&(0x7f0000000840)="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", 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000180), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="00000000080000000000000000000000c4d981ae211e6951"], 0x1}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in=@rand_addr, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in=@dev={0xac, 0x14, 0x14, 0x11}, @in6=@ipv4={[], [], @loopback}, 0x4e24, 0x0, 0x4e23, 0xa07d, 0xa, 0xd2e26a9d6a60f3c4, 0x20, 0x2f, 0x0, r2}, {0x4, 0x3, 0x831, 0x2000000000, 0x1, 0x5, 0x5, 0x81}, {0x401, 0x7, 0x8, 0x7ee}, 0x8, 0x6e6bbc, 0x1, 0x1, 0x3}, {{@in6=@remote, 0x4d3}, 0xa, @in6=@mcast2, 0x3503, 0x2, 0x1, 0x2, 0x0, 0x7, 0xe7c6}}, 0xe8) r3 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e173dc73ba964a4189007c7c40db8fb4b64dd8ec4d366") epoll_create(0x4) fcntl$setstatus(r3, 0x4, 0x4000) sendfile(r1, r3, &(0x7f0000000040), 0x1080000010) 03:33:55 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x20000, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000140)=""/244) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000440)={@dev}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@broadcast, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000640)=0x34a) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000002c0)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}, 0x5c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[]}}, 0x0) getgid() syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x0, 0x0, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) r1 = memfd_create(&(0x7f0000000840)="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", 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000180), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="00000000080000000000000000000000c4d981ae211e6951"], 0x1}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in=@rand_addr, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in=@dev={0xac, 0x14, 0x14, 0x11}, @in6=@ipv4={[], [], @loopback}, 0x4e24, 0x0, 0x4e23, 0xa07d, 0xa, 0xd2e26a9d6a60f3c4, 0x20, 0x2f, 0x0, r2}, {0x4, 0x3, 0x831, 0x2000000000, 0x1, 0x5, 0x5, 0x81}, {0x401, 0x7, 0x8, 0x7ee}, 0x8, 0x6e6bbc, 0x1, 0x1, 0x3}, {{@in6=@remote, 0x4d3}, 0xa, @in6=@mcast2, 0x3503, 0x2, 0x1, 0x2, 0x0, 0x7, 0xe7c6}}, 0xe8) r3 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e173dc73ba964a4189007c7c40db8fb4b64dd8ec4d366") epoll_create(0x4) fcntl$setstatus(r3, 0x4, 0x4000) sendfile(r1, r3, &(0x7f0000000040), 0x1080000010) 03:33:55 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2a576", 0x1b}], 0x1, &(0x7f00001f9fe0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f00000c5ff7)='/dev/sg#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x80da14, 0x8001, 0x20000000}) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 03:33:55 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000080)) getegid() getgid() stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getuid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@dev, @in=@remote}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000500)=0xe8) getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0726969ef69dc00d99069203737c3397c2a0626a540a52ef34298c4215971e400e5e5c4a2a10f9344613232231569c8212e1a1a3ef0f6585501c4e1edd1f631a3b786e298edc4227992749f55") 03:33:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='vcan0\x00', 0x10) sendto$inet(r0, &(0x7f0000000b40)="94", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00006d1fd4)="db", 0x1, 0x4000010, &(0x7f00004daff0)={0x2, 0x0, @loopback}, 0x10) write(r0, &(0x7f0000000040)="1acbcb75ce3c3dc9edabb5a2e6b48b07bcbefcc1a1f84f9488393825b2026eb6fbccd36bf4d163948b6d551f19be4b8e54455dab3f89ab8b06a9c2a76fea14feb16945b43c8c69", 0x47) 03:33:55 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) gettid() setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000240), 0x4) open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_init() pipe(&(0x7f00000004c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000001c0)) socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@ipv4={[], [], @loopback}}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, 0xe8) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000580), 0x0) syz_execute_func(&(0x7f0000000340)="42805da0450fef69dc2101eecec462790f7dbe19fa380f38211af3f081768cc8000000c481b2e5bc2b000000962121f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:55 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fchmod(0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x20, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0, &(0x7f0000000a80)={0x0, 0x1c9c380}) keyctl$setperm(0x13, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, 0xe8) getgroups(0x0, &(0x7f00000011c0)) 03:33:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x0, 0x0, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) r1 = memfd_create(&(0x7f0000000840)="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", 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000180), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="00000000080000000000000000000000c4d981ae211e6951"], 0x1}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in=@rand_addr, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in=@dev={0xac, 0x14, 0x14, 0x11}, @in6=@ipv4={[], [], @loopback}, 0x4e24, 0x0, 0x4e23, 0xa07d, 0xa, 0xd2e26a9d6a60f3c4, 0x20, 0x2f, 0x0, r2}, {0x4, 0x3, 0x831, 0x2000000000, 0x1, 0x5, 0x5, 0x81}, {0x401, 0x7, 0x8, 0x7ee}, 0x8, 0x6e6bbc, 0x1, 0x1, 0x3}, {{@in6=@remote, 0x4d3}, 0xa, @in6=@mcast2, 0x3503, 0x2, 0x1, 0x2, 0x0, 0x7, 0xe7c6}}, 0xe8) r3 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e173dc73ba964a4189007c7c40db8fb4b64dd8ec4d366") epoll_create(0x4) fcntl$setstatus(r3, 0x4, 0x4000) sendfile(r1, r3, &(0x7f0000000040), 0x1080000010) 03:33:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x0, 0x0, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) r1 = memfd_create(&(0x7f0000000840)="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", 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000180), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="00000000080000000000000000000000c4d981ae211e6951"], 0x1}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in=@rand_addr, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in=@dev={0xac, 0x14, 0x14, 0x11}, @in6=@ipv4={[], [], @loopback}, 0x4e24, 0x0, 0x4e23, 0xa07d, 0xa, 0xd2e26a9d6a60f3c4, 0x20, 0x2f, 0x0, r2}, {0x4, 0x3, 0x831, 0x2000000000, 0x1, 0x5, 0x5, 0x81}, {0x401, 0x7, 0x8, 0x7ee}, 0x8, 0x6e6bbc, 0x1, 0x1, 0x3}, {{@in6=@remote, 0x4d3}, 0xa, @in6=@mcast2, 0x3503, 0x2, 0x1, 0x2, 0x0, 0x7, 0xe7c6}}, 0xe8) r3 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e173dc73ba964a4189007c7c40db8fb4b64dd8ec4d366") epoll_create(0x4) fcntl$setstatus(r3, 0x4, 0x4000) sendfile(r1, r3, &(0x7f0000000040), 0x1080000010) 03:33:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000014c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000004fc0)={&(0x7f0000000000), 0xc, &(0x7f0000004f80)={&(0x7f0000000280)={0x94, r1, 0x1, 0x0, 0x0, {0x4001}, [{{0x8, 0x1, r2}, {0x78, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x3c, 0x6, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}]}, 0x94}}, 0x0) 03:33:56 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00'}, 0x10) syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000004c0)={0x0, @broadcast, @broadcast}, &(0x7f0000000500)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000002200), 0x0, 0x0, &(0x7f00000022c0)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000023c0)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000002400)=@hci, &(0x7f0000002480)=0x80) accept4$packet(0xffffffffffffff9c, &(0x7f00000024c0), &(0x7f0000002500)=0x14, 0x0) accept4(0xffffffffffffff9c, &(0x7f0000002540)=@hci, &(0x7f00000025c0)=0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002600)={@ipv4={[], [], @remote}}, &(0x7f0000002640)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000026c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000002700)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002740)={{{@in, @in6=@local}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000002840)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002880)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000028c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000002900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002940)=0x14, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000002cc0)={&(0x7f0000002980)=@can, 0x80, &(0x7f0000002c40), 0x0, &(0x7f0000002c80)=""/39, 0x27}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000002d00)={'vcan0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002e00)={@local}, &(0x7f0000002e40)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000002e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002ec0)=0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c461d25d53a6c442e145bd16a700004e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") [ 360.172496] netlink: 'syz-executor5': attribute type 3 has an invalid length. 03:33:56 executing program 5: memfd_create(&(0x7f0000000080)='@eth1cpuset\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe8}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x0, 0x0, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) r1 = memfd_create(&(0x7f0000000840)="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", 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000180), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="00000000080000000000000000000000c4d981ae211e6951"], 0x1}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in=@rand_addr, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in=@dev={0xac, 0x14, 0x14, 0x11}, @in6=@ipv4={[], [], @loopback}, 0x4e24, 0x0, 0x4e23, 0xa07d, 0xa, 0xd2e26a9d6a60f3c4, 0x20, 0x2f, 0x0, r2}, {0x4, 0x3, 0x831, 0x2000000000, 0x1, 0x5, 0x5, 0x81}, {0x401, 0x7, 0x8, 0x7ee}, 0x8, 0x6e6bbc, 0x1, 0x1, 0x3}, {{@in6=@remote, 0x4d3}, 0xa, @in6=@mcast2, 0x3503, 0x2, 0x1, 0x2, 0x0, 0x7, 0xe7c6}}, 0xe8) r3 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e173dc73ba964a4189007c7c40db8fb4b64dd8ec4d366") epoll_create(0x4) fcntl$setstatus(r3, 0x4, 0x4000) sendfile(r1, r3, &(0x7f0000000040), 0x1080000010) 03:33:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x0, 0x0, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) r1 = memfd_create(&(0x7f0000000840)="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", 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000180), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="00000000080000000000000000000000c4d981ae211e6951"], 0x1}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in=@rand_addr, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in=@dev={0xac, 0x14, 0x14, 0x11}, @in6=@ipv4={[], [], @loopback}, 0x4e24, 0x0, 0x4e23, 0xa07d, 0xa, 0xd2e26a9d6a60f3c4, 0x20, 0x2f, 0x0, r2}, {0x4, 0x3, 0x831, 0x2000000000, 0x1, 0x5, 0x5, 0x81}, {0x401, 0x7, 0x8, 0x7ee}, 0x8, 0x6e6bbc, 0x1, 0x1, 0x3}, {{@in6=@remote, 0x4d3}, 0xa, @in6=@mcast2, 0x3503, 0x2, 0x1, 0x2, 0x0, 0x7, 0xe7c6}}, 0xe8) r3 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e173dc73ba964a4189007c7c40db8fb4b64dd8ec4d366") epoll_create(0x4) fcntl$setstatus(r3, 0x4, 0x4000) sendfile(r1, r3, &(0x7f0000000040), 0x1080000010) 03:33:56 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000380)='nv\x00', 0x2fc) pipe2(&(0x7f00000003c0), 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) socket$key(0xf, 0x3, 0x2) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x7dd, 0x0, @dev}, 0x10) 03:33:57 executing program 1: clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000300)=0xc) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) gettid() openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x0, 0x0) move_pages(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0), 0x0) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") getpgid(0xffffffffffffffff) getpriority(0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000004c0)="f2446d6969ef69dc00d990c8412aff0f0f373740dcf686c19086d9f28fc94e2179fbe5e54175455d0f2e1a1a0131a3b786e2989f7f") 03:33:57 executing program 3: r0 = memfd_create(&(0x7f0000000180)='**[+\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000240)={0x0, 0x0, 0x7, 'queue1\x00', 0xffffffffffffff81}) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f00000001c0)={0x3}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r1, &(0x7f0000000200)={0xffffffff}, 0x8, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='numa_maps\x00') syz_mount_image$msdos(&(0x7f0000000600)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe803, 0x1, &(0x7f0000000440)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x10, &(0x7f0000000680)={[], 0x2000000}) timerfd_create(0x7, 0x800) 03:33:57 executing program 5: syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x0, 0x400) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./bus\x00'}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000480), &(0x7f0000000380), &(0x7f00000004c0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) gettid() fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) lstat(&(0x7f00000030c0)='./bus\x00', &(0x7f0000003100)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000031c0)={{{@in6=@dev, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000003380)='./bus\x00', &(0x7f00000033c0)) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:57 executing program 1: timerfd_create(0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000380), 0xffffffffffffff99) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000200)=0xc) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) geteuid() stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) getuid() getresgid(&(0x7f0000005a40), &(0x7f0000000540), &(0x7f0000005a00)) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000c80)={0x30}, 0x30) getuid() getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000780)=0xe8) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) syz_execute_func(&(0x7f0000000440)="42805da0120fef69dc0f01eecec03b0619fad20e38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae575450f2e1ac4010d64ac1e5d31a3b771fb6443f75b05") 03:33:57 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x4b98, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xeffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xbfffffffffffffff, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000340)=0x234) write$cgroup_int(r2, &(0x7f0000000080)=0x50020000000005, 0x297ef) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000100)=0xc38) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080), 0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000300)={0x4, 0x0, 0x9070, 0xffffffffffffff7f, 'syz1\x00', 0x10000}) personality(0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8) openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xe4ad, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3ff, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x0, 0x0, 0x4, 0x4, 0x9, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f00000000c0)) [ 361.438213] FAT-fs (loop3): Directory bread(block 2563) failed [ 361.451266] FAT-fs (loop3): Directory bread(block 2564) failed [ 361.482875] FAT-fs (loop3): Directory bread(block 2565) failed [ 361.512185] FAT-fs (loop3): Directory bread(block 2566) failed [ 361.530020] FAT-fs (loop3): Directory bread(block 2567) failed [ 361.565568] FAT-fs (loop3): Directory bread(block 2568) failed [ 361.588595] FAT-fs (loop3): Directory bread(block 2569) failed [ 361.623444] FAT-fs (loop3): Directory bread(block 2570) failed 03:33:58 executing program 0: getgroups(0x1, &(0x7f00000000c0)=[0xffffffffffffffff]) lstat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000280)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)) getgroups(0x0, &(0x7f0000000200)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 361.702702] FAT-fs (loop3): Directory bread(block 2571) failed [ 361.738392] FAT-fs (loop3): Directory bread(block 2572) failed 03:33:58 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x4b98, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xeffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xbfffffffffffffff, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000340)=0x234) write$cgroup_int(r2, &(0x7f0000000080)=0x50020000000005, 0x297ef) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000100)=0xc38) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080), 0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000300)={0x4, 0x0, 0x9070, 0xffffffffffffff7f, 'syz1\x00', 0x10000}) personality(0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8) openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xe4ad, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3ff, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x0, 0x0, 0x4, 0x4, 0x9, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f00000000c0)) 03:33:58 executing program 3: r0 = memfd_create(&(0x7f0000000180)='**[+\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000240)={0x0, 0x0, 0x7, 'queue1\x00', 0xffffffffffffff81}) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f00000001c0)={0x3}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r1, &(0x7f0000000200)={0xffffffff}, 0x8, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='numa_maps\x00') syz_mount_image$msdos(&(0x7f0000000600)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe803, 0x1, &(0x7f0000000440)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x10, &(0x7f0000000680)={[], 0x2000000}) timerfd_create(0x7, 0x800) 03:33:58 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x4b98, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xeffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xbfffffffffffffff, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000340)=0x234) write$cgroup_int(r2, &(0x7f0000000080)=0x50020000000005, 0x297ef) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000100)=0xc38) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080), 0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000300)={0x4, 0x0, 0x9070, 0xffffffffffffff7f, 'syz1\x00', 0x10000}) personality(0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8) openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xe4ad, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3ff, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x0, 0x0, 0x4, 0x4, 0x9, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f00000000c0)) 03:33:58 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000380)='nv\x00', 0x2fc) pipe2(&(0x7f00000003c0), 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) socket$key(0xf, 0x3, 0x2) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x7dd, 0x0, @dev}, 0x10) [ 362.086319] FAT-fs (loop3): Directory bread(block 2563) failed [ 362.140102] FAT-fs (loop3): Directory bread(block 2564) failed [ 362.198582] FAT-fs (loop3): Directory bread(block 2565) failed [ 362.233764] FAT-fs (loop3): Directory bread(block 2566) failed [ 362.272087] FAT-fs (loop3): Directory bread(block 2567) failed [ 362.280322] FAT-fs (loop3): Directory bread(block 2568) failed [ 362.287058] FAT-fs (loop3): Directory bread(block 2569) failed [ 362.320668] FAT-fs (loop3): Directory bread(block 2570) failed 03:33:58 executing program 5: request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="7f7070703173656c6600", 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700)) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) inotify_init1(0x0) prctl$void(0x0) openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000300)=ANY=[], &(0x7f0000000440)) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@assoc_value, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x50, &(0x7f0000000380)}, 0x10) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000240)='./file0\x00', 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000db2000/0x3000)=nil) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") clock_gettime(0x0, &(0x7f00000002c0)) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x0, 0x0, "68eaec35ebd92188039926a3d47fd4831148cdb086e9c73aa740028cf7f0ee0e6689bd6e88666a24950f4e013ea219d6361c4cc1b8f3abfc2c46b095211878bb12a8a16e998773eb7bba544dc2ddfed4"}, 0xd8) getrlimit(0x0, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000004c0)=ANY=[], &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000740), &(0x7f0000000640)=0x8) clock_gettime(0x0, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180), &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000880)}, &(0x7f0000000480)=0x10) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000800)) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000680), 0x4) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_init_net_socket$llc(0x1a, 0x0, 0x0) 03:33:58 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x4b98, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xeffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xbfffffffffffffff, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000340)=0x234) write$cgroup_int(r2, &(0x7f0000000080)=0x50020000000005, 0x297ef) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000100)=0xc38) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080), 0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000300)={0x4, 0x0, 0x9070, 0xffffffffffffff7f, 'syz1\x00', 0x10000}) personality(0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8) openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xe4ad, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3ff, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x0, 0x0, 0x4, 0x4, 0x9, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f00000000c0)) [ 362.363631] FAT-fs (loop3): Directory bread(block 2571) failed [ 362.393313] FAT-fs (loop3): Directory bread(block 2572) failed 03:33:58 executing program 3: r0 = memfd_create(&(0x7f0000000180)='**[+\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000240)={0x0, 0x0, 0x7, 'queue1\x00', 0xffffffffffffff81}) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f00000001c0)={0x3}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r1, &(0x7f0000000200)={0xffffffff}, 0x8, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='numa_maps\x00') syz_mount_image$msdos(&(0x7f0000000600)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe803, 0x1, &(0x7f0000000440)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x10, &(0x7f0000000680)={[], 0x2000000}) timerfd_create(0x7, 0x800) 03:33:58 executing program 0: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000840)=""/66, &(0x7f00000008c0)=0x42) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sched_getattr(0x0, &(0x7f0000000180), 0x30, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000a40)) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$alg(0x26, 0x5, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000002640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in=@dev, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) clock_gettime(0x0, &(0x7f0000002440)) recvmmsg(0xffffffffffffffff, &(0x7f0000002340), 0x0, 0x0, &(0x7f0000002480)) getsockname$packet(0xffffffffffffffff, &(0x7f00000024c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002500)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002540)={@mcast1}, &(0x7f0000002580)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002600)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002d80)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002e80)={{{@in6, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004540)={{{@in=@local, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000004640)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000004680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000046c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000004940), &(0x7f0000004980)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000049c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000004ac0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004b40)={{{@in=@multicast2, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}}}, &(0x7f0000004c40)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004c80)={@multicast1, @remote}, &(0x7f0000004cc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000050c0)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000005180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000051c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000005200), &(0x7f0000005240)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:58 executing program 1: timerfd_create(0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000380), 0xffffffffffffff99) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000200)=0xc) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) geteuid() stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) getuid() getresgid(&(0x7f0000005a40), &(0x7f0000000540), &(0x7f0000005a00)) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000c80)={0x30}, 0x30) getuid() getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000780)=0xe8) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) syz_execute_func(&(0x7f0000000440)="42805da0120fef69dc0f01eecec03b0619fad20e38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae575450f2e1ac4010d64ac1e5d31a3b771fb6443f75b05") 03:33:59 executing program 2: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) syz_execute_func(&(0x7f0000000040)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:59 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000380)='nv\x00', 0x2fc) pipe2(&(0x7f00000003c0), 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) socket$key(0xf, 0x3, 0x2) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x7dd, 0x0, @dev}, 0x10) [ 362.853679] FAT-fs (loop3): Directory bread(block 2563) failed [ 362.889192] FAT-fs (loop3): Directory bread(block 2564) failed [ 362.903562] FAT-fs (loop3): Directory bread(block 2565) failed [ 362.914876] FAT-fs (loop3): Directory bread(block 2566) failed [ 362.939605] FAT-fs (loop3): Directory bread(block 2567) failed [ 362.968871] FAT-fs (loop3): Directory bread(block 2568) failed [ 362.993325] FAT-fs (loop3): Directory bread(block 2569) failed [ 363.015917] FAT-fs (loop3): Directory bread(block 2570) failed [ 363.037390] FAT-fs (loop3): Directory bread(block 2571) failed [ 363.059680] FAT-fs (loop3): Directory bread(block 2572) failed 03:33:59 executing program 3: r0 = memfd_create(&(0x7f0000000180)='**[+\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000240)={0x0, 0x0, 0x7, 'queue1\x00', 0xffffffffffffff81}) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f00000001c0)={0x3}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r1, &(0x7f0000000200)={0xffffffff}, 0x8, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='numa_maps\x00') syz_mount_image$msdos(&(0x7f0000000600)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe803, 0x1, &(0x7f0000000440)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x10, &(0x7f0000000680)={[], 0x2000000}) timerfd_create(0x7, 0x800) 03:33:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x1000000000004) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000a8000)=[{&(0x7f0000aef000)="580000001400192300bb4b80040d8c562806f0ffffff04106a9643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004001ce1ed5e0000000000221f100001000700f8ffff0000ec6b0f536e", 0x58}], 0x1) [ 363.455121] FAT-fs (loop3): Directory bread(block 2563) failed [ 363.477801] FAT-fs (loop3): Directory bread(block 2564) failed [ 363.493799] FAT-fs (loop3): Directory bread(block 2565) failed 03:33:59 executing program 5: keyctl$dh_compute(0x9, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000002f00)=""/4096, &(0x7f0000000600)=0x1321) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000200)=""/133) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") [ 363.504366] FAT-fs (loop3): Directory bread(block 2566) failed [ 363.512800] FAT-fs (loop3): Directory bread(block 2567) failed [ 363.536298] FAT-fs (loop3): Directory bread(block 2568) failed 03:33:59 executing program 1: timerfd_create(0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000380), 0xffffffffffffff99) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000200)=0xc) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) geteuid() stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) getuid() getresgid(&(0x7f0000005a40), &(0x7f0000000540), &(0x7f0000005a00)) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000c80)={0x30}, 0x30) getuid() getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000780)=0xe8) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) syz_execute_func(&(0x7f0000000440)="42805da0120fef69dc0f01eecec03b0619fad20e38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae575450f2e1ac4010d64ac1e5d31a3b771fb6443f75b05") [ 363.558526] FAT-fs (loop3): Directory bread(block 2569) failed [ 363.571095] syz-executor5 uses obsolete (PF_INET,SOCK_PACKET) [ 363.581295] FAT-fs (loop3): Directory bread(block 2570) failed [ 363.597642] FAT-fs (loop3): Directory bread(block 2571) failed [ 363.621746] FAT-fs (loop3): Directory bread(block 2572) failed 03:34:00 executing program 0: seccomp(0x2, 0x0, &(0x7f0000000100)) msgget$private(0x0, 0x0) geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{}, {}, 0x0, {0x2, 0x0, @dev}, 'syzkaller0\x00'}) getgroups(0x0, &(0x7f0000000440)) socket$nl_route(0x10, 0x3, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f0000000340)=ANY=[]}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000004c0)={'filter\x00', 0x7, 0x4, 0x558, 0x258, 0x118, 0x0, 0x470, 0x470, 0x470, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00'}}, {{@arp={@loopback, @multicast1, 0x0, 0x0, @mac=@remote, {}, @mac=@remote, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'team_slave_0\x00', 'ip_vti0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@random="9a6033f6e840", @loopback, @rand_addr}}}, {{@arp={@broadcast, @multicast2, 0x0, 0x0, @mac=@link_local, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'eql\x00'}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a80)={'ifb0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b00)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b80)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004d40)={{{@in=@broadcast}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000004e40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004e80)={@local}, &(0x7f0000004ec0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005040)={0x0, @dev, @multicast1}, &(0x7f0000005080)=0xc) getpeername(0xffffffffffffffff, &(0x7f00000050c0)=@xdp, &(0x7f0000005140)=0x80) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xe, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x84}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 03:34:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$sock_attach_bpf(r0, 0x1, 0x25, &(0x7f00000000c0), 0x239) 03:34:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000230000000002800000850000000000fc0095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x10, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x47}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) 03:34:00 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000300)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000380)='nv\x00', 0x2fc) pipe2(&(0x7f00000003c0), 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) socket$key(0xf, 0x3, 0x2) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x7dd, 0x0, @dev}, 0x10) 03:34:00 executing program 2: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x22, 0x1}]}}}]}, 0x44}}, 0x0) 03:34:00 executing program 3: openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200000, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000080)=""/124) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x2, 0x0) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:00 executing program 2: mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) geteuid() stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) getgid() syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x0, 0x0) stat(0xffffffffffffffff, &(0x7f0000000300)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:00 executing program 5: prctl$setname(0x34, &(0x7f0000000180)="5a70726f632970726f63626465762b18fde9bb683026776c616e306e6f6465767365637572690979275b216574683000") msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) memfd_create(&(0x7f0000000500)='/dev/zero\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000780)={@dev, @rand_addr}, &(0x7f0000000940)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d40)={{{@in=@remote, @in6=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @dev, @multicast2}, &(0x7f0000001e40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004000), &(0x7f0000004040)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004080)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000004180)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000004280), &(0x7f00000042c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004300)={{{@in=@dev, @in=@rand_addr}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000004400)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004440), &(0x7f0000004480)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004cc0)={0x0, @dev, @rand_addr}, &(0x7f0000004d00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000004d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004d80)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000004dc0)={'vcan0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004e00), &(0x7f0000004e40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004f40)={{{@in=@local, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000005040)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000005140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005180)=0x14, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f00000051c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005200)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005240)={{{@in=@dev, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000005340)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005480)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000005580)={'vcan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000005dc0)={&(0x7f0000000600), 0xc, &(0x7f0000005d80)={&(0x7f00000055c0)={0x14}, 0x14}}, 0x0) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000003c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:01 executing program 1: timerfd_create(0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000380), 0xffffffffffffff99) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000200)=0xc) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) geteuid() stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) getuid() getresgid(&(0x7f0000005a40), &(0x7f0000000540), &(0x7f0000005a00)) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000c80)={0x30}, 0x30) getuid() getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000780)=0xe8) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) syz_execute_func(&(0x7f0000000440)="42805da0120fef69dc0f01eecec03b0619fad20e38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae575450f2e1ac4010d64ac1e5d31a3b771fb6443f75b05") 03:34:01 executing program 3: keyctl$set_reqkey_keyring(0x4, 0xfffffffd) futex(&(0x7f0000000ac0), 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000540)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/ppp\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000440)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000480)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000004c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000c00)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/rtc0\x00', 0x0, 0x0) getresuid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000a00)={0x90}, 0x90) setresgid(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) syz_open_dev$sndpcmc(&(0x7f0000000640)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000600)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540), &(0x7f0000000580)=0x4) getgid() setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000007c0)={'filter\x00', 0x4}, 0x68) clock_gettime(0x0, &(0x7f0000000500)) write$input_event(0xffffffffffffffff, &(0x7f0000000900), 0x18) getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xfffffffffffffff9) connect$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) 03:34:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x101240, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0x4) syz_open_dev$vcsn(&(0x7f0000000580)='/dev/vcs#\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000500)=')em0[\x00'}, 0x299) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@local}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000f00)={"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"}) syz_genetlink_get_family_id$nbd(&(0x7f00000004c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000000c0), 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in6, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0), 0x0, &(0x7f0000000680)=[@cred={0x20}], 0x20}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000400), &(0x7f00000003c0)=0xffffffffffffffae) getgid() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)) 03:34:01 executing program 2: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast2, 0x0, 0x32}, 0x0, @in6=@loopback}}, 0xe8) sendmsg(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001680)}, 0x0) 03:34:01 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_route(0x10, 0x3, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000580)) lstat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003dc0)=0xc) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000003e40)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000180)) geteuid() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'bridge0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000940)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:01 executing program 2: socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shutdown(r0, 0x2) 03:34:01 executing program 2: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x4) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000240)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000440)={0xfffffe4f}, 0x4) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f00000000c0)=0x54) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@local, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) 03:34:02 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x80000000000046, 0x0) clock_settime(0x0, &(0x7f0000000100)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") sendfile(r0, r1, &(0x7f0000000000)=0xb, 0x2b428a52) 03:34:02 executing program 1: setitimer(0x1, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x7530}}, &(0x7f0000000080)) setitimer(0x1, &(0x7f0000000180)={{0x0, 0x2710}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002000)="4259805da012c4a1fa2ca2579d000001eea873fe19430fbae35b3e2d45a6e8290f38211af3f081768cc8000000c4a3e90e9a00000000856cc46379164c67f34b75450f2e1a8f0818ef0d0e0000000044dbe271fb0703") getpgrp(0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000380)=0x14, 0x0) getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@local, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in=@local, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@remote}}, &(0x7f0000000640)=0xe8) getuid() socket$inet6(0xa, 0x0, 0x0) iopl(0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000006c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) socket(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)=""/25, &(0x7f0000000080)=0x19) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000680)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000006240)={&(0x7f0000000280), 0xc, &(0x7f0000006200)={&(0x7f0000000780)=ANY=[]}}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/83) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000880)=""/4096) pipe(&(0x7f0000000240)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x14) io_setup(0x0, &(0x7f00000002c0)) 03:34:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @empty, 0xb}, 0x1c) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000200), &(0x7f0000000280)=0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) 03:34:02 executing program 3: futex(&(0x7f0000000440), 0x5, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ion\x00', 0x0, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000005c0), &(0x7f0000000680)=0x4) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, 0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000980)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000ac0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b40)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b80)={@empty, @multicast1}, &(0x7f0000000bc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c00)={{{@in=@multicast2, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000d00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d40)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000e40)=0xe8) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 03:34:02 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_route(0x10, 0x3, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000580)) lstat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003dc0)=0xc) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000003e40)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000180)) geteuid() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'bridge0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000940)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @empty, 0xb}, 0x1c) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000200), &(0x7f0000000280)=0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) 03:34:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 03:34:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 03:34:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @empty, 0xb}, 0x1c) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000200), &(0x7f0000000280)=0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) 03:34:02 executing program 2: memfd_create(&(0x7f0000000080)='/dev/vcs\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:34:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 03:34:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @empty, 0xb}, 0x1c) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000200), &(0x7f0000000280)=0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) 03:34:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000180)="2e2f66692e65318c", 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x11, 0x2, r0, &(0x7f0000000380)="2e2f66692e65318c00") fanotify_mark(r1, 0x90, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') 03:34:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100), 0x8) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000001c0)={[], 0x8d1}) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000080)) [ 366.948744] FAT-fs (loop1): bogus number of reserved sectors [ 366.974695] FAT-fs (loop1): Can't find a valid FAT filesystem 03:34:03 executing program 3: mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) pipe2(&(0x7f0000000200), 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000240)) eventfd2(0x0, 0x0) eventfd2(0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffff9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000280)) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000001c0), 0x4) syz_open_procfs(0x0, &(0x7f0000000180)='mountstats\x00') setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f00000002c0), 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:03 executing program 5: getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) 03:34:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000500), 0x0) r1 = accept4(r0, 0x0, &(0x7f00000000c0)=0x2e4, 0x0) recvmsg(r1, &(0x7f000000b880)={&(0x7f000000b500)=@xdp, 0x80, &(0x7f000000b800), 0x0, &(0x7f000000b840)=""/64, 0x40}, 0x0) 03:34:03 executing program 1: clock_gettime(0x5, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:03 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_route(0x10, 0x3, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000580)) lstat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003dc0)=0xc) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000003e40)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000180)) geteuid() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'bridge0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000940)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:03 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=""/23, 0x17}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001980)={'NETMAP\x00'}, &(0x7f00000019c0)=0x1e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) futex(&(0x7f0000000380), 0x5, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f00000005c0), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f00000007c0)={0x7}, 0x7) openat(0xffffffffffffffff, &(0x7f00000018c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='.request_key_auth\x00', &(0x7f0000000600), &(0x7f0000000640)='keyring\x00', 0x0) add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0x0) add_key(&(0x7f0000000580)='user\x00', &(0x7f00000006c0), 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x6, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000001a00)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'tunl0\x00'}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000400), 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000840)) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@loopback, @in6=@local}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000b80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) getresuid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@rand_addr, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000e80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) getgid() getgroups(0x0, &(0x7f0000000f40)) lstat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)) getresgid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getresgid(&(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) lstat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), &(0x7f00000012c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000a40)='system.posix_acl_access\x00', &(0x7f0000001380), 0x24, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) add_key(&(0x7f0000000500)='big_key\x00', &(0x7f0000000540), &(0x7f0000000600), 0x0, 0xfffffffffffffff9) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000800)=0xe8) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000400), 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_execute_func(&(0x7f0000000240)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:03 executing program 2: socketpair(0xfffffffffffffffe, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x99, 0x4, 0x70}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002d80)={r0, &(0x7f0000000000)="c0", &(0x7f0000002cc0)=""/182}, 0x18) 03:34:03 executing program 0: futex(&(0x7f00000000c0), 0x5, 0x0, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000004c0), &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000540), &(0x7f0000000580)=0x20) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, &(0x7f0000000680)=0xb0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[]}}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000140)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:04 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000340)) fcntl$getown(0xffffffffffffff9c, 0x9) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[]}}, 0x0) fchmod(0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x20, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0, &(0x7f0000000a80)={0x0, 0x1c9c380}) keyctl$setperm(0x13, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, 0xe8) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000000240)) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000001380)={0x0, 0x0, 0x0, 0xffffffffffffff9c}) geteuid() mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000380)=""/189) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003900)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003a00)=0xe8) stat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) 03:34:04 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_route(0x10, 0x3, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000580)) lstat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003dc0)=0xc) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000003e40)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000180)) geteuid() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'bridge0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000940)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:04 executing program 5: getpgid(0x0) getpgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:34:04 executing program 3: clock_gettime(0x8, &(0x7f0000000500)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) clock_settime(0x0, &(0x7f0000000040)={0x77359400}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:20 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=""/23, 0x17}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001980)={'NETMAP\x00'}, &(0x7f00000019c0)=0x1e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) futex(&(0x7f0000000380), 0x5, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f00000005c0), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f00000007c0)={0x7}, 0x7) openat(0xffffffffffffffff, &(0x7f00000018c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='.request_key_auth\x00', &(0x7f0000000600), &(0x7f0000000640)='keyring\x00', 0x0) add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0x0) add_key(&(0x7f0000000580)='user\x00', &(0x7f00000006c0), 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x6, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000001a00)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'tunl0\x00'}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000400), 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000840)) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@loopback, @in6=@local}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000b80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) getresuid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@rand_addr, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000e80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) getgid() getgroups(0x0, &(0x7f0000000f40)) lstat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)) getresgid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getresgid(&(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) lstat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), &(0x7f00000012c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000a40)='system.posix_acl_access\x00', &(0x7f0000001380), 0x24, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) add_key(&(0x7f0000000500)='big_key\x00', &(0x7f0000000540), &(0x7f0000000600), 0x0, 0xfffffffffffffff9) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000800)=0xe8) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000400), 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_execute_func(&(0x7f0000000240)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:20 executing program 0: r0 = socket$inet6(0xa, 0x100000803, 0x2b) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000017, 0x0) 03:33:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000300)}, 0x5a) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 03:33:20 executing program 2: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000140)) iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000640), 0x1000) io_setup(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000002c0)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0)={0x0, 0x1c9c380}) syz_execute_func(&(0x7f0000000240)="42805da06a0f460fc4a205b6930080000001ee263a208600d7c0c1762e660f3a20cc0066662626660f69b2000000002900c4e1985f560c0f0f99583dda10030606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adf3400fe6d07e") 03:33:20 executing program 0: prctl$setname(0x21, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000400)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) getpid() geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a80)) lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) fstat(0xffffffffffffffff, &(0x7f0000000b80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c00)) getuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001480)={{{@in=@broadcast, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000001580)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001d80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001dc0)={{{@in6=@mcast2, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001ec0)=0xe8) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000030c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003100)={{{@in=@loopback, @in6=@local}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000003200)=0xe8) getresgid(&(0x7f0000003240), &(0x7f0000003280), &(0x7f00000032c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003340)={{{@in=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000003440)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003480)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003500)={{{@in=@local, @in6=@local}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000003600)=0xe8) getresgid(&(0x7f0000003640), &(0x7f0000003680), &(0x7f00000036c0)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000003700), &(0x7f0000003740), &(0x7f0000003780)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c80)) geteuid() stat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003d80)) stat(&(0x7f0000003dc0)='./file0\x00', &(0x7f0000003e00)) getresgid(&(0x7f0000003e80), &(0x7f0000003ec0), &(0x7f0000003f00)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() stat(&(0x7f0000003f40)='./file0\x00', &(0x7f0000003f80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004000)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@remote, @in=@loopback}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000004140)=0xe8) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004440)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000004480)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004b40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004b80)={{{@in=@loopback, @in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000004c80)=0xe8) stat(&(0x7f0000004cc0)='./file0\x00', &(0x7f0000004d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004d80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004dc0)={{{@in6=@dev, @in=@remote}}, {{@in6=@ipv4={[], [], @remote}}}}, &(0x7f0000004ec0)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004fc0), 0x0, 0x0) ioperm(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000340), &(0x7f00000005c0)=0x14) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'tunl0\x00'}) 03:33:20 executing program 5: accept(0xffffffffffffff9c, &(0x7f00000005c0)=@in={0x2, 0x0, @dev}, &(0x7f0000000680)=0x80) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f00000006c0), &(0x7f0000000840)=0x4) pipe(&(0x7f0000000700)) getpid() sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0xfffffffffffffe8e, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f00000000c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000140)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000480), &(0x7f0000000740), 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000880)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:33:20 executing program 4: io_setup(0x2, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000180)={0x0, @multicast2, 0x0, 0x0, 'ovf\x00'}, 0x2c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='-/keyringvboxnet0+trusted\x00'}, 0x10) getgroups(0x5e8, &(0x7f00000002c0)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='/dev/dsp#\x00'}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000400)=@vsock, 0x32a, &(0x7f00000000c0)}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) clock_gettime(0x0, &(0x7f0000000480)) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), 0x0) socket$inet(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f00000005c0)=""/153) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) socket$inet(0x2, 0x0, 0x0) flock(0xffffffffffffffff, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000340), &(0x7f0000000300)=0x4) syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000680)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000580)) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f0000000080)={'bond0\x00'}) 03:33:20 executing program 3: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syncfs(r0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 03:33:20 executing program 3: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syncfs(r0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 03:33:20 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=""/23, 0x17}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001980)={'NETMAP\x00'}, &(0x7f00000019c0)=0x1e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) futex(&(0x7f0000000380), 0x5, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f00000005c0), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f00000007c0)={0x7}, 0x7) openat(0xffffffffffffffff, &(0x7f00000018c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='.request_key_auth\x00', &(0x7f0000000600), &(0x7f0000000640)='keyring\x00', 0x0) add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0x0) add_key(&(0x7f0000000580)='user\x00', &(0x7f00000006c0), 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x6, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000001a00)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'tunl0\x00'}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000400), 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000840)) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@loopback, @in6=@local}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000b80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) getresuid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@rand_addr, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000e80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) getgid() getgroups(0x0, &(0x7f0000000f40)) lstat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)) getresgid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getresgid(&(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) lstat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), &(0x7f00000012c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000a40)='system.posix_acl_access\x00', &(0x7f0000001380), 0x24, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) add_key(&(0x7f0000000500)='big_key\x00', &(0x7f0000000540), &(0x7f0000000600), 0x0, 0xfffffffffffffff9) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000800)=0xe8) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000400), 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_execute_func(&(0x7f0000000240)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:20 executing program 3: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syncfs(r0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 03:33:20 executing program 3: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syncfs(r0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 03:33:20 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getpid() fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000004c0)='statm\x00') symlinkat(&(0x7f0000000480)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00') mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000380), &(0x7f00000003c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000400)=0x100) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000840)) io_cancel(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000880)}, &(0x7f0000000980)) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000800)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c80)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9c421e572f1f0a6e5e54175440f2efbc4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") syncfs(0xffffffffffffffff) connect$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/117, &(0x7f00000007c0)=0x75) getgid() mount$fuse(0x0, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='fuse\x00', 0x0, &(0x7f0000000dc0)=ANY=[]) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000880)=""/152}, 0x18) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000b00)) 03:33:20 executing program 0: clock_gettime(0x7fffffffffffffe, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ion\x00', 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000080), 0x10) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast2, @local}, 0xc) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000004c0)=""/33, 0x21) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x8}, &(0x7f0000000580), 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @local}}}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000006c0)}, &(0x7f00000007c0)=0x10) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000400)={0x28, 0x0, 0x0, @host}, 0x10) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000240)) 03:33:20 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000007c0)='/proc/self/net/pfkey\x00'}, 0xffffffffffffff0b) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:21 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)={[{@part={'part', 0x3d, 0x10001}}, {@barrier='barrier'}, {@force='force'}, {@decompose='decompose'}]}) 03:33:21 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) add_key(&(0x7f0000001940)='id_legacy\x00', &(0x7f0000001980), &(0x7f00000019c0), 0x0, 0xfffffffffffffffe) request_key(&(0x7f00000004c0)="6b657972696e67007c450dabed8648b67665977a21d7b1b379f2620c27f87f5afb3fc528a93fa4ffdf83d6c49ed4b97829eaa682ee8c6b4da54202e85d13b570cf91312a092c156a14eb7d7a869b6d6ccb2c1d54140837128a11c76a9cb7c3185e703bbb27390400000085b6eee67c5efc591a9dfcb831b7eec447babfe178b09f12a6e5ae80fdc37cac09c47a3f87465c4622a668cecd725649d3f7b73aa8564887b8542e6d7e", &(0x7f0000000400), &(0x7f0000000440)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) inotify_init1(0x0) prctl$void(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000480)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0\x00', 0x4915, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f00000005c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000280)={0x14}, 0x14) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000580)) ptrace(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) clock_getres(0x0, &(0x7f00000000c0)) 03:33:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f0000000540)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0xff25, &(0x7f0000000900)="3a694c00c9e9393fbd53df40ed1368d0e207b80045f5121474e5dc040232dfbd6beb08ac3d3fff9596acf05be6552adfdcaf2d475256d19a6106bb8acc9100b23afe68876574bba2f73dd41526720972e919c932e1999096573d28c5268b0edd9196ed3d1e2aee0607301d9c2cda42393892bbc17fa6b657b07bd5bb34d28dfed52490a948529a8cece529b9e2b37f979f5b362f85c27b10643bb765c1b693f4a0ae2ac38cb1192e42244e4e57548943964e993472841a0c7acec415dd82f06c1c82e542d2b66f0000000000000000000000000000000000000000eca3b7543fb51496b33d03a3c231885368ff7d79154dae6dfa300b0a457296c13c5236e8b14805a6921f65c7") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="46805da06ebd260f70741181a5c4230cf961d055ce73fe19fa380f78b5c4417f1201f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e6f3420faedd0703") 03:33:21 executing program 2: times(&(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") 03:33:21 executing program 3: r0 = socket(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'bridge_slave_1\x00'}, 0x18) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="4790d202729036ccb2b1c702e0492adb", 0x10) 03:33:21 executing program 0: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a02b6969ef69dc00d9ce41ff0fba37370f38211ac4c19086d9f28fc9410feef24e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:22 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=""/23, 0x17}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001980)={'NETMAP\x00'}, &(0x7f00000019c0)=0x1e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) futex(&(0x7f0000000380), 0x5, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f00000005c0), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f00000007c0)={0x7}, 0x7) openat(0xffffffffffffffff, &(0x7f00000018c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='.request_key_auth\x00', &(0x7f0000000600), &(0x7f0000000640)='keyring\x00', 0x0) add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0x0) add_key(&(0x7f0000000580)='user\x00', &(0x7f00000006c0), 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x6, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000001a00)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'tunl0\x00'}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000400), 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x14}, 0x14}}, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000840)) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@loopback, @in6=@local}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000b80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) getresuid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@rand_addr, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000e80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) getgid() getgroups(0x0, &(0x7f0000000f40)) lstat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)) getresgid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getresgid(&(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) lstat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), &(0x7f00000012c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000a40)='system.posix_acl_access\x00', &(0x7f0000001380), 0x24, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) add_key(&(0x7f0000000500)='big_key\x00', &(0x7f0000000540), &(0x7f0000000600), 0x0, 0xfffffffffffffff9) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000800)=0xe8) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000400), 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_execute_func(&(0x7f0000000240)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:22 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[], 0x131}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="021200001100000026bd7000fcdbdf2501001400790000000800120003000000000000003800000046003270b4a69956a98fe40000000000ac1414bb0000000000000000000400000000000000000000000000000000000004000400170000001f000000000700003f01000000000000030000000000000002009d00050000000100000000000000"], 0x88}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 03:33:22 executing program 5: futex(&(0x7f0000000440), 0x5, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ion\x00', 0x0, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000005c0), &(0x7f0000000680)=0x4) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, 0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000980)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000ac0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b40)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b80)={@empty, @multicast1}, &(0x7f0000000bc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c00)={{{@in=@multicast2, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000d00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d40)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000e40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001700)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000001800)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @multicast2}, &(0x7f0000002c00)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002c80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000034c0), 0x0, 0x0, &(0x7f0000003500)={0x0, 0x989680}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003580)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003700)={@mcast1}, &(0x7f0000003740)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003780)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000003880)=0xe8) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:22 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) fgetxattr(0xffffffffffffffff, &(0x7f0000001c00)=@known='trusted.overlay.upper\x00', &(0x7f0000002000)=""/75, 0x4b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) gettid() fcntl$setown(r0, 0x8, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e24, 0x273cfb72, @loopback, 0x5}}, 0x5e00, 0x1}, &(0x7f0000000280)=0x90) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f00000006c0), &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)="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", 0x1002, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000001d80)="dcd8bdb7ef62f3f700000000000000000000", 0x3080, &(0x7f0000000440)="fa3a51c0858bc666b01dc16b56bb5cb2") mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x1000}}, 0x20) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000480)={0x80000000, 0x7ff}) recvmmsg(r0, &(0x7f0000001e00)=[{{&(0x7f00000008c0)=@xdp, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/124, 0x7c}, {&(0x7f00000019c0)=""/44, 0x2c}, {&(0x7f0000001a80)=""/124, 0x7c}, {&(0x7f0000001b00)=""/213, 0xd5}, {&(0x7f0000001c40)=""/105, 0x69}], 0x6, &(0x7f0000001d40)=""/24, 0x18, 0xc59d}, 0x81}, {{0x0, 0x0, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=""/5, 0x5, 0x7}, 0x401}], 0x2, 0x40, &(0x7f0000001e80)={0x77359400}) mount(&(0x7f0000000380), &(0x7f0000000880)='./file0/file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000640)) rseq(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000001f40)={0x3f, 0x3, 0xff}) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240), 0x4) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fallocate(r0, 0x40080000004, 0x0, 0x0) futex(&(0x7f0000000000)=0xfffffffffffffffe, 0x400000085, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) 03:33:22 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000006440), 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f00000003c0), 0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x14) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000580), 0x8) openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000300)) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000006640), &(0x7f0000006680)=0x8) dup(0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000066c0), &(0x7f0000006700)=0x20) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) membarrier(0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0xc) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000400), 0x1) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") readlinkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)=""/114, 0x72) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000500), &(0x7f00000005c0)=0x20) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000007c0)) getpgrp(0xffffffffffffffff) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000800)) 03:33:22 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) fgetxattr(0xffffffffffffffff, &(0x7f0000001c00)=@known='trusted.overlay.upper\x00', &(0x7f0000002000)=""/75, 0x4b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) gettid() fcntl$setown(r0, 0x8, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e24, 0x273cfb72, @loopback, 0x5}}, 0x5e00, 0x1}, &(0x7f0000000280)=0x90) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f00000006c0), &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)="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", 0x1002, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000001d80)="dcd8bdb7ef62f3f700000000000000000000", 0x3080, &(0x7f0000000440)="fa3a51c0858bc666b01dc16b56bb5cb2") mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x1000}}, 0x20) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000480)={0x80000000, 0x7ff}) recvmmsg(r0, &(0x7f0000001e00)=[{{&(0x7f00000008c0)=@xdp, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/124, 0x7c}, {&(0x7f00000019c0)=""/44, 0x2c}, {&(0x7f0000001a80)=""/124, 0x7c}, {&(0x7f0000001b00)=""/213, 0xd5}, {&(0x7f0000001c40)=""/105, 0x69}], 0x6, &(0x7f0000001d40)=""/24, 0x18, 0xc59d}, 0x81}, {{0x0, 0x0, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=""/5, 0x5, 0x7}, 0x401}], 0x2, 0x40, &(0x7f0000001e80)={0x77359400}) mount(&(0x7f0000000380), &(0x7f0000000880)='./file0/file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000640)) rseq(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000001f40)={0x3f, 0x3, 0xff}) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240), 0x4) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fallocate(r0, 0x40080000004, 0x0, 0x0) futex(&(0x7f0000000000)=0xfffffffffffffffe, 0x400000085, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) 03:33:22 executing program 2: setitimer(0x0, &(0x7f0000000600)={{0x0, 0x2710}}, &(0x7f00000005c0)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) gettid() futex(&(0x7f0000000200), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000180)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)="2e2f6367726f75702e6e65742f73797a3000a31cd0b16033f116ef007eae9e0968c2b3081582ae6b28ffe0bc5e7c2ccf91dfe4910825ca0dc3b1a14e5700bdd009ab4502fd1a83d8410fdf78f10b6265b9ec605b5be77fb61d60813a1b8476994d981b18f4d50f1bd0de416c617b18983ea287d5b3aa89b2e10000000000", 0x200002, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@loopback, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000380)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000400)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740)={@remote, @rand_addr}, &(0x7f0000000780)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a00)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a80)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in6=@mcast2, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000bc0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in=@dev, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000d00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@remote, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000f40)={@local}, &(0x7f0000000f80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in=@dev, @in=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f00000010c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001100), &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001180)={@multicast1, @local}, &(0x7f00000011c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001200)={0x0, @multicast2, @multicast1}, &(0x7f0000001240)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001280)={@mcast2}, &(0x7f00000012c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001440)={'syzkaller0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001540)={@broadcast, @dev}, &(0x7f0000001580)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @loopback, @local}, &(0x7f0000001600)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001680)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001840)={{{@in6=@dev, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000001940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004400)={0x0, 0x989680}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in=@multicast1}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000004540)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000004580)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000045c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f00000046c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)={0x0, @dev, @multicast2}, &(0x7f0000004800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005c00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000005d00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000005ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005f00)=0x14, 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:22 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) fgetxattr(0xffffffffffffffff, &(0x7f0000001c00)=@known='trusted.overlay.upper\x00', &(0x7f0000002000)=""/75, 0x4b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) gettid() fcntl$setown(r0, 0x8, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e24, 0x273cfb72, @loopback, 0x5}}, 0x5e00, 0x1}, &(0x7f0000000280)=0x90) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f00000006c0), &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)="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", 0x1002, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000001d80)="dcd8bdb7ef62f3f700000000000000000000", 0x3080, &(0x7f0000000440)="fa3a51c0858bc666b01dc16b56bb5cb2") mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x1000}}, 0x20) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000480)={0x80000000, 0x7ff}) recvmmsg(r0, &(0x7f0000001e00)=[{{&(0x7f00000008c0)=@xdp, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/124, 0x7c}, {&(0x7f00000019c0)=""/44, 0x2c}, {&(0x7f0000001a80)=""/124, 0x7c}, {&(0x7f0000001b00)=""/213, 0xd5}, {&(0x7f0000001c40)=""/105, 0x69}], 0x6, &(0x7f0000001d40)=""/24, 0x18, 0xc59d}, 0x81}, {{0x0, 0x0, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=""/5, 0x5, 0x7}, 0x401}], 0x2, 0x40, &(0x7f0000001e80)={0x77359400}) mount(&(0x7f0000000380), &(0x7f0000000880)='./file0/file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000640)) rseq(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000001f40)={0x3f, 0x3, 0xff}) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240), 0x4) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fallocate(r0, 0x40080000004, 0x0, 0x0) futex(&(0x7f0000000000)=0xfffffffffffffffe, 0x400000085, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) 03:33:22 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x2, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f0000000040), 0x3000000}, 0x20) 03:33:23 executing program 0: clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) getpgid(0xffffffffffffffff) getpriority(0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:23 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) fgetxattr(0xffffffffffffffff, &(0x7f0000001c00)=@known='trusted.overlay.upper\x00', &(0x7f0000002000)=""/75, 0x4b) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) gettid() fcntl$setown(r0, 0x8, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e24, 0x273cfb72, @loopback, 0x5}}, 0x5e00, 0x1}, &(0x7f0000000280)=0x90) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f00000006c0), &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)="6365706800e993000056b741d1e0f62a0c9a60e76130f91c17a16f8a5437c9680aad3b4e45eddd76aab71a9e975d0144faffff8bc8f9d30f9c55ced1150431a9b1a839bbf3f467d3c0acde4e07a4ba536d54200f4e4dc3b02679197d7ba36309981462765060c41372bfb4f51c4a130a10ce0ac1731ce47f5ba461f37619f3ad2f00f19a93b6f27a14fbfbec7c5373c0ebc09635adcddfca4f93c509d545d61fa5709bd17e803195711a64cb2ce69fde25ca87e550d13393bc940545a7ef2fa9c0039e7a306d1210c286934192dfe5ecc4e2988d60a5d3e078b18955c779f9292f7b3e223bcb978f7ca1cfe8388f97bdf7adf81db314c17f57fb4f4db4d3713a5ec3da5a57aac2418385e87c4ac81c5650676b06f397b359ccc0d7094a48ab721fe8bdf7813e1dc11e635fb51a8311242c886531b0a19c11", 0x1002, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000001d80)="dcd8bdb7ef62f3f700000000000000000000", 0x3080, &(0x7f0000000440)="fa3a51c0858bc666b01dc16b56bb5cb2") mount(&(0x7f0000fb6000), &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x1000}}, 0x20) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000480)={0x80000000, 0x7ff}) recvmmsg(r0, &(0x7f0000001e00)=[{{&(0x7f00000008c0)=@xdp, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/124, 0x7c}, {&(0x7f00000019c0)=""/44, 0x2c}, {&(0x7f0000001a80)=""/124, 0x7c}, {&(0x7f0000001b00)=""/213, 0xd5}, {&(0x7f0000001c40)=""/105, 0x69}], 0x6, &(0x7f0000001d40)=""/24, 0x18, 0xc59d}, 0x81}, {{0x0, 0x0, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=""/5, 0x5, 0x7}, 0x401}], 0x2, 0x40, &(0x7f0000001e80)={0x77359400}) mount(&(0x7f0000000380), &(0x7f0000000880)='./file0/file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000640)) rseq(&(0x7f0000000540)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000001f40)={0x3f, 0x3, 0xff}) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240), 0x4) umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fallocate(r0, 0x40080000004, 0x0, 0x0) futex(&(0x7f0000000000)=0xfffffffffffffffe, 0x400000085, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) 03:33:23 executing program 1: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000240), 0x8) membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000600)) fcntl$getown(0xffffffffffffffff, 0x9) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) creat(&(0x7f0000000380)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x10) open(&(0x7f0000000340)='./file1\x00', 0x0, 0x0) inotify_init1(0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) io_setup(0x0, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0, &(0x7f0000000c00)={0x0, 0x989680}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000002c0), &(0x7f0000000300)=0x4) fcntl$getflags(0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000440)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:33:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="bf160000000000004061000000000000616200000000000085100000010000009500000000000000bf100000000000000f200000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 372.531589] audit: type=1326 audit(2000000003.390:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11260 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:23 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f00000000c0)={0x0, 0x0, [0x48f]}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000500)=[@text64={0x40, &(0x7f0000000480)="660f38816b0066baf80cb8509b4186ef66bafc0cb87a5b0000ef400f09440f20c0350d000000440f22c0b991000040b8e4dd0000ba000000000f30b9800000c00f3235002000000f3066450f083ef2650f01c90f01d1c7442400d3000000c7442402e4000000c7442406000000000f011424", 0x72}], 0x1, 0x0, &(0x7f0000000200), 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000140)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:23 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0xf) 03:33:23 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x5, 0x0) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x894c, &(0x7f0000000440)) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0xb702, &(0x7f00000001c0)) 03:33:23 executing program 5: rt_sigpending(&(0x7f00000000c0), 0x8) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) semget$private(0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000900), &(0x7f00000009c0)=0x98) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000a00), &(0x7f0000000a40)=0x10) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in=@broadcast, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'vcan0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000006c0)={@loopback, @multicast1}, &(0x7f0000000700)=0xc) getpeername(0xffffffffffffffff, &(0x7f0000000740)=@can, &(0x7f00000007c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@loopback, @in=@local}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000800)=0xe8) getsockname(0xffffffffffffffff, &(0x7f0000000b80)=@hci, &(0x7f0000000840)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c00)={{{@in=@dev, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@loopback}}, &(0x7f0000000d00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000d40)={'vcan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d80)={0x0, @dev, @multicast2}, &(0x7f0000000dc0)=0x3) accept$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f80)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000001080)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000049c0)={0x0, @dev}, &(0x7f0000004a00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004a40)={{{@in, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000004b40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004b80)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000004c80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004cc0)={{}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000004dc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000061c0)={{{@in6=@loopback, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000062c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006300)={0x0, @dev, @loopback}, &(0x7f0000006340)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000006bc0)={&(0x7f0000000440), 0xc, &(0x7f0000006b80)={&(0x7f0000006380)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") getpeername$netlink(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") accept(0xffffffffffffffff, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x80) 03:33:23 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)=""/193, &(0x7f0000000280)=""/97, &(0x7f0000000300)=""/127}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000780)={0x1, 0x0, &(0x7f00000006c0)=""/115, &(0x7f0000000580)=""/156, &(0x7f0000000940)=""/185}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0xfffffffffffffffc) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000640)={0x2, 0x0, [{0x0, 0x83, &(0x7f0000000880)=""/131}, {0x0, 0xfffffffffffffde2, &(0x7f00000004c0)=""/11}]}) [ 373.082849] audit: type=1326 audit(2000000003.940:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11290 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:25 executing program 2: setitimer(0x0, &(0x7f0000000600)={{0x0, 0x2710}}, &(0x7f00000005c0)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) gettid() futex(&(0x7f0000000200), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000180)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)="2e2f6367726f75702e6e65742f73797a3000a31cd0b16033f116ef007eae9e0968c2b3081582ae6b28ffe0bc5e7c2ccf91dfe4910825ca0dc3b1a14e5700bdd009ab4502fd1a83d8410fdf78f10b6265b9ec605b5be77fb61d60813a1b8476994d981b18f4d50f1bd0de416c617b18983ea287d5b3aa89b2e10000000000", 0x200002, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@loopback, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000380)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000400)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740)={@remote, @rand_addr}, &(0x7f0000000780)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a00)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a80)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in6=@mcast2, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000bc0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in=@dev, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000d00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@remote, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000f40)={@local}, &(0x7f0000000f80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in=@dev, @in=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f00000010c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001100), &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001180)={@multicast1, @local}, &(0x7f00000011c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001200)={0x0, @multicast2, @multicast1}, &(0x7f0000001240)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001280)={@mcast2}, &(0x7f00000012c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001440)={'syzkaller0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001540)={@broadcast, @dev}, &(0x7f0000001580)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @loopback, @local}, &(0x7f0000001600)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001680)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001840)={{{@in6=@dev, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000001940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004400)={0x0, 0x989680}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in=@multicast1}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000004540)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000004580)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000045c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f00000046c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)={0x0, @dev, @multicast2}, &(0x7f0000004800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005c00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000005d00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000005ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005f00)=0x14, 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:25 executing program 3: prctl$setmm(0x59616d61, 0xfffdffffffffffff, &(0x7f0000ffa000/0x4000)=nil) 03:33:25 executing program 0: readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)=""/11, 0xb) gettid() gettid() getpid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000000c0)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) clock_nanosleep(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) 03:33:25 executing program 1: mlockall(0x3) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BINDER_THREAD_EXIT(0xffffffffffffffff, 0x40046208, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='pids.current\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000001c0)) accept$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000140)}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000240), 0x4) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000700)=@generic) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540), 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000480)=0x6e) getresuid(&(0x7f0000000300), &(0x7f0000000380), &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dcc4c17e12515ace41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b71306e298987b7f") write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f00000003c0)) io_setup(0x0, &(0x7f0000000140)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) io_pgetevents(0x0, 0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000600)={&(0x7f00000005c0), 0x8}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:33:25 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f00000000c0)={0x0, 0x0, [0x48f]}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000500)=[@text64={0x40, &(0x7f0000000480)="660f38816b0066baf80cb8509b4186ef66bafc0cb87a5b0000ef400f09440f20c0350d000000440f22c0b991000040b8e4dd0000ba000000000f30b9800000c00f3235002000000f3066450f083ef2650f01c90f01d1c7442400d3000000c7442402e4000000c7442406000000000f011424", 0x72}], 0x1, 0x0, &(0x7f0000000200), 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000140)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:25 executing program 5: keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) sysfs$1(0x1, &(0x7f0000000180)='/dev/null\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='lo#ppp1#user\x00', 0xffffffffffffff9c}, 0x10) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000200), 0x4) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 03:33:25 executing program 3: add_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480), &(0x7f00000004c0)='r', 0x1, 0xfffffffffffffffb) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='statm\x00') symlinkat(&(0x7f0000000480)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00') futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setrlimit(0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) fcntl$getown(0xffffffffffffffff, 0x9) io_setup(0x0, &(0x7f0000000240)) wait4(0x0, &(0x7f0000000180), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") connect$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) keyctl$read(0x16, 0x0, &(0x7f00000034c0)=""/4096, 0x12af) 03:33:25 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f00000000c0)={0x0, 0x0, [0x48f]}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000500)=[@text64={0x40, &(0x7f0000000480)="660f38816b0066baf80cb8509b4186ef66bafc0cb87a5b0000ef400f09440f20c0350d000000440f22c0b991000040b8e4dd0000ba000000000f30b9800000c00f3235002000000f3066450f083ef2650f01c90f01d1c7442400d3000000c7442402e4000000c7442406000000000f011424", 0x72}], 0x1, 0x0, &(0x7f0000000200), 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000140)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:25 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0xc008ae88, &(0x7f00000000c0)={0x0, 0x0, [0x48f]}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000500)=[@text64={0x40, &(0x7f0000000480)="660f38816b0066baf80cb8509b4186ef66bafc0cb87a5b0000ef400f09440f20c0350d000000440f22c0b991000040b8e4dd0000ba000000000f30b9800000c00f3235002000000f3066450f083ef2650f01c90f01d1c7442400d3000000c7442402e4000000c7442406000000000f011424", 0x72}], 0x1, 0x0, &(0x7f0000000200), 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000140)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:33:26 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa}, 0x10) 03:33:26 executing program 5: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x3fc, 0x0) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f0000000340)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}}) clock_gettime(0x0, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@empty, @remote}, &(0x7f0000000540)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000680)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@rand_addr, @in6}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@remote}}, {{}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:26 executing program 4: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f00000002c0), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000340)={'veth1\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000380), 0x14) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000440)) syz_execute_func(&(0x7f0000000540)="42805da0636969ef69dc00d9c422f9db3869203637c3397c2a45ac0f6a88a3ae88a3ae219864a741dfe0400f01efe1e57638ecec01460f01ee31a3b786e2989f") [ 375.524536] [ 375.526659] ********************************************************** [ 375.559765] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 375.577833] ** ** [ 375.617866] ** trace_printk() being used. Allocating extra memory. ** [ 375.647826] ** ** [ 375.663117] ** This means that this is a DEBUG kernel and it is ** [ 375.680165] ** unsafe for production use. ** [ 375.693116] ** ** [ 375.699853] ** If you see this message and you are not debugging ** [ 375.723151] ** the kernel, report this immediately to your vendor! ** [ 375.740415] ** ** [ 375.752100] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 375.781264] ********************************************************** 03:33:26 executing program 2: setitimer(0x0, &(0x7f0000000600)={{0x0, 0x2710}}, &(0x7f00000005c0)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) gettid() futex(&(0x7f0000000200), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000180)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)="2e2f6367726f75702e6e65742f73797a3000a31cd0b16033f116ef007eae9e0968c2b3081582ae6b28ffe0bc5e7c2ccf91dfe4910825ca0dc3b1a14e5700bdd009ab4502fd1a83d8410fdf78f10b6265b9ec605b5be77fb61d60813a1b8476994d981b18f4d50f1bd0de416c617b18983ea287d5b3aa89b2e10000000000", 0x200002, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@loopback, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000380)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000400)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740)={@remote, @rand_addr}, &(0x7f0000000780)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a00)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a80)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in6=@mcast2, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000bc0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in=@dev, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000d00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@remote, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000f40)={@local}, &(0x7f0000000f80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in=@dev, @in=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f00000010c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001100), &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001180)={@multicast1, @local}, &(0x7f00000011c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001200)={0x0, @multicast2, @multicast1}, &(0x7f0000001240)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001280)={@mcast2}, &(0x7f00000012c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001440)={'syzkaller0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001540)={@broadcast, @dev}, &(0x7f0000001580)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @loopback, @local}, &(0x7f0000001600)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001680)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001840)={{{@in6=@dev, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000001940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004400)={0x0, 0x989680}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in=@multicast1}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000004540)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000004580)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000045c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f00000046c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)={0x0, @dev, @multicast2}, &(0x7f0000004800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005c00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000005d00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000005ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005f00)=0x14, 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:26 executing program 3: prctl$setname(0xf, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000fef000/0x11000)=nil, 0x11000, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000007c0)=""/191) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000006c0)=ANY=[], &(0x7f00000000c0)='syzkaller\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") socket$inet_udp(0x2, 0x2, 0x0) getegid() getegid() fstat(0xffffffffffffffff, &(0x7f00000001c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) write$nbd(0xffffffffffffffff, &(0x7f0000000380), 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xfe0f) getgid() write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000004c0)={0x14}, 0x14) 03:33:26 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f00000001c0)={0x0, 0x0, 0x705000}) 03:33:26 executing program 0: keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0), &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000200), 0x8) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:27 executing program 1: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x271e, &(0x7f0000ffc000/0x2000)=nil, 0x2) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0af0fef69dce9d92a5c4125ff0f0f37f90f38211ac4c482fd2520410feefa4e2179fbb6c8e5f5e5f5455de0932ebc2ebc0d64ac1a4c5d9f7f") 03:33:27 executing program 5: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001dc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001f00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f40)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000002040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002080)={@multicast2, @dev}, &(0x7f00000020c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002140)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002300), &(0x7f0000002340)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002440)={0x0, @remote, @local}, &(0x7f0000002480)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000480), 0xc, &(0x7f00000028c0)={&(0x7f00000024c0)={0x14}, 0x14}}, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) fstat(0xffffffffffffffff, &(0x7f0000001080)) fstat(0xffffffffffffff9c, &(0x7f0000001100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x28, 0x10, 0x101, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x4}]}]}, 0x28}}, 0x0) 03:33:27 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) fallocate(r0, 0x8, 0x0, 0x44c3) 03:33:27 executing program 4: mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000980)="428055a0836969ef69dc00d9ce41ff0f1837374f021ac48f6818ccb6ffefffff0b4e2179fbade54175450f2e1a8fe95893cdc4433538e2900d64ac1e5d31a3b706656566460fe25a379f7f") 03:33:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a02000000ff81004e227e00000058000b4824ca944f64009400050028925aa8000000000000008000f0ffffffff09000000fff5dd00000010000100090c0c00fcff0000040e05a5", 0x58}], 0x1) 03:33:27 executing program 3: keyctl$dh_compute(0x18, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) syz_extract_tcp_res(&(0x7f0000000040), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:27 executing program 0: keyctl$invalidate(0x11, 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00') syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000340), &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0), &(0x7f0000000400)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}}, 0xa0) syz_execute_func(&(0x7f0000000200)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:33:28 executing program 2: setitimer(0x0, &(0x7f0000000600)={{0x0, 0x2710}}, &(0x7f00000005c0)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) gettid() futex(&(0x7f0000000200), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000180)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)="2e2f6367726f75702e6e65742f73797a3000a31cd0b16033f116ef007eae9e0968c2b3081582ae6b28ffe0bc5e7c2ccf91dfe4910825ca0dc3b1a14e5700bdd009ab4502fd1a83d8410fdf78f10b6265b9ec605b5be77fb61d60813a1b8476994d981b18f4d50f1bd0de416c617b18983ea287d5b3aa89b2e10000000000", 0x200002, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in=@loopback, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000380)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000400)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740)={@remote, @rand_addr}, &(0x7f0000000780)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a00)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a80)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in6=@mcast2, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000bc0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in=@dev, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000d00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@remote, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000f40)={@local}, &(0x7f0000000f80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in=@dev, @in=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f00000010c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001100), &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001180)={@multicast1, @local}, &(0x7f00000011c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001200)={0x0, @multicast2, @multicast1}, &(0x7f0000001240)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001280)={@mcast2}, &(0x7f00000012c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001340)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001440)={'syzkaller0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001540)={@broadcast, @dev}, &(0x7f0000001580)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @loopback, @local}, &(0x7f0000001600)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001680)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001840)={{{@in6=@dev, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000001940)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004400)={0x0, 0x989680}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in=@multicast1}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000004540)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000004580)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000045c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f00000046c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)={0x0, @dev, @multicast2}, &(0x7f0000004800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005c00)={{{@in=@multicast1, @in=@dev}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000005d00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000005ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005f00)=0x14, 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:28 executing program 1: clock_gettime(0x0, &(0x7f0000000940)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) bind$netlink(0xffffffffffffffff, &(0x7f0000000580), 0xc) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @local}, @in=@local}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000300)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000280)=""/77, 0x4d, 0x0, &(0x7f0000000500)=@ll, 0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000600)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f") futex(&(0x7f00000009c0), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000980), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) 03:33:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8400000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000100)=@mpls_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x1c, 0x14}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:33:28 executing program 4: syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x3, 0x240000) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f00000003c0)={0x7, 0x6d, 0x2}, 0x7) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000900)="173074fb8c62c7934719212e2502da2d2f2a5736bcec670f5da0de3b165e6999d4d12b2a1bf0c14ea0a482a6a489facd33e339ac611aa3", 0x37, 0x7fffffff, &(0x7f0000000340)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) r2 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3f, 0x200500) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000940)) accept$alg(r2, 0x0, 0x0) gettid() recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendto$inet6(0xffffffffffffffff, &(0x7f0000000880)="7116976428203587543bbc1562b772328507b45f649b278def9a0759738087a5d38c0172c5b11f32cfe1490600860cf613aaae2bb333590dcb6f20e4c6f1b04e62832c521f249fc69a8f2a36762f9f454b568187edba3e371cf1a6c76496", 0x5e, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x45a) write$binfmt_elf64(r0, &(0x7f0000001400)=ANY=[@ANYBLOB="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"], 0xbba) ioctl$RTC_UIE_ON(r1, 0x7003) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000280)={{&(0x7f0000000a00)=""/244, 0xf4}, &(0x7f0000000200), 0x20}, 0x20) 03:33:28 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/igmp6\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@mcast1, @in6}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) preadv(r0, &(0x7f0000000480), 0x1000000000000147, 0x74000000) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000900)={'nr0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:33:28 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000006c0)) r1 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040), &(0x7f0000000700)="6fdf052151c4fa6e82a470dda2b15127100d3913ed013c1f891e6cc6682f4eccb88c4aff828f8a846651228b5cfe62d5fdedda79d66b4e762f45f96edd33aa84f05d4c0e61ba520577ed447e27827267c60d3c33417cd5316178e521cb24fbd59b3066bef7669e58beb887d6c04b07e4af2ee6656c72a72e868a82f7c21abf689bf5b4b06f1bdc9d34126d8c07c425ec05e00abe10f2f837", 0x98, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0x0, 0x0) 03:33:28 executing program 0: syz_open_dev$sndpcmc(&(0x7f0000000580)='/dev/snd/pcmC#D#c\x00', 0x0, 0x20081) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockname(0xffffffffffffffff, &(0x7f00000005c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000006c0)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000740)={@ipv4={[], [], @loopback}}, &(0x7f0000000780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000007c0)={@broadcast, @multicast1}, &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in=@loopback, @in6=@ipv4={[], [], @multicast1}}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000980)={@remote}, &(0x7f00000009c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000a00)={'syzkaller0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000b40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000b80)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000bc0), &(0x7f0000000c00)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000c80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @multicast1, @multicast2}, &(0x7f0000000d00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d40)={@multicast2, @multicast2}, &(0x7f0000000d80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ec0)={{{@in=@multicast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001100)={{{@in=@rand_addr, @in6=@local}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@mcast2}}, &(0x7f0000001200)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001240)={{{@in6, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000001340)=0xe8) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000002900)={&(0x7f0000001380)=@can, 0x80, &(0x7f0000002840)}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002940)={{{@in6, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000002a40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003080)={&(0x7f0000000540), 0xc, &(0x7f0000003040)={&(0x7f0000002a80)=ANY=[]}}, 0x0) clock_gettime(0x0, &(0x7f0000000040)) setitimer(0x0, &(0x7f0000000400)={{0x0, 0x2710}}, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000300)=@can, &(0x7f0000000380)=0x80) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)={@dev}, 0x14) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000440)=""/1) accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000240)={0x20}, 0x20) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) syz_execute_func(&(0x7f00000000c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) 03:33:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 03:33:29 executing program 3: clock_gettime(0xffffffffffffffbe, &(0x7f0000000380)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000004c0)=ANY=[]) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, &(0x7f0000000080), &(0x7f0000000140)}, &(0x7f0000000180)=0x78) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000700)=0xc) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000740)={0xa0}, 0xa0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000600)={@empty, @ipv4={[], [], @local}, @remote}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) pipe(&(0x7f0000000480)) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000340)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/dev_mcast\x00') read(r1, &(0x7f0000000040)=""/230, 0x20000126) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)=',') 03:33:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x2c, 0x2f, 0x829, 0x0, 0x0, {0x3}, [@nested={0x18, 0x0, [@typed={0x14, 0xa, @ipv6=@loopback}]}]}, 0x2c}}, 0x0) [ 378.348328] netlink: 'syz-executor1': attribute type 10 has an invalid length. [ 378.364074] openvswitch: netlink: Flow get message rejected, Key attribute missing. 03:33:29 executing program 5: rt_sigtimedwait(&(0x7f0000000000), &(0x7f00000000c0), 0xffffffffffffffff, 0x8) [ 378.389400] netlink: 'syz-executor1': attribute type 10 has an invalid length. [ 378.414756] openvswitch: netlink: Flow get message rejected, Key attribute missing. 03:33:29 executing program 5: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ec0)={{{@in, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002fc0)=0xe8) getegid() accept(0xffffffffffffffff, &(0x7f0000003000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003080)=0x80) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000030c0)={{{@in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000031c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000033c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003400)) getpgid(0x0) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003980), &(0x7f00000039c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a80)) getuid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003b80)={{{@in6=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000003c80)=0xe8) getgroups(0x0, &(0x7f0000003cc0)) getpgrp(0xffffffffffffffff) stat(&(0x7f0000003d00)='./file0\x00', &(0x7f0000003d40)) getgroups(0x0, &(0x7f0000004840)) getpgid(0xffffffffffffffff) stat(&(0x7f0000003e00)='./file1\x00', &(0x7f0000003e40)) getgroups(0x0, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f40), &(0x7f0000003f80)=0xc) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003fc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004000)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000004100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) lstat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000004600)) getpgid(0x0) getuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:33:29 executing program 1: ustat(0x3, &(0x7f0000000540)) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)}, &(0x7f0000000380)=0x10) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440), 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000400)) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000002c0), 0x2) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000003c0), 0x8) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) getpid() ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000580)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f1a40a564a741dfe0400f21efe5e57d0fecec1a1a01460fc4017972e6fe31a3b786e298c481ed54d1") prlimit64(0x0, 0x0, &(0x7f0000000300), 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000180), 0x0) 03:33:29 executing program 2: shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rfkill\x00', 0x0, 0x0) getpgid(0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000740)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@mcast1, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000880)=0xe8) accept4(0xffffffffffffffff, 0x0, &(0x7f00000008c0), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in=@loopback, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002440)={{{@in6=@dev, @in6}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000002540)=0xe8) getresuid(&(0x7f0000002580), &(0x7f00000025c0), &(0x7f0000002600)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002640)='/dev/loop-control\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000002680)) fcntl$getown(0xffffffffffffff9c, 0x9) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002700), 0x4) socket$bt_rfcomm(0x1f, 0x0, 0x3) socket$bt_hidp(0x1f, 0x3, 0x6) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002740)) getpgrp(0xffffffffffffffff) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002b40)={{{@in6=@local, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000002c40)=0xe8) getgroups(0x0, &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002d00)={&(0x7f0000000640)=@proc, 0xc, &(0x7f0000002b00), 0x0, &(0x7f0000002cc0)}, 0x0) shmat(0x0, &(0x7f0000ff8000/0x4000)=nil, 0x0) shmdt(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000480)=""/201) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f383066470f3a63cb00bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298c441fd2fe47d") 03:33:29 executing program 4: syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x3, 0x240000) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f00000003c0)={0x7, 0x6d, 0x2}, 0x7) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000900)="173074fb8c62c7934719212e2502da2d2f2a5736bcec670f5da0de3b165e6999d4d12b2a1bf0c14ea0a482a6a489facd33e339ac611aa3", 0x37, 0x7fffffff, &(0x7f0000000340)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) r2 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3f, 0x200500) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000940)) accept$alg(r2, 0x0, 0x0) gettid() recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendto$inet6(0xffffffffffffffff, &(0x7f0000000880)="7116976428203587543bbc1562b772328507b45f649b278def9a0759738087a5d38c0172c5b11f32cfe1490600860cf613aaae2bb333590dcb6f20e4c6f1b04e62832c521f249fc69a8f2a36762f9f454b568187edba3e371cf1a6c76496", 0x5e, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x45a) write$binfmt_elf64(r0, &(0x7f0000001400)=ANY=[@ANYBLOB="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"], 0xbba) ioctl$RTC_UIE_ON(r1, 0x7003) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000280)={{&(0x7f0000000a00)=""/244, 0xf4}, &(0x7f0000000200), 0x20}, 0x20) 03:33:29 executing program 0: syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x3, 0x240000) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f00000003c0)={0x7, 0x6d, 0x2}, 0x7) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000900)="173074fb8c62c7934719212e2502da2d2f2a5736bcec670f5da0de3b165e6999d4d12b2a1bf0c14ea0a482a6a489facd33e339ac611aa3", 0x37, 0x7fffffff, &(0x7f0000000340)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) r2 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3f, 0x200500) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000940)) accept$alg(r2, 0x0, 0x0) gettid() recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendto$inet6(0xffffffffffffffff, &(0x7f0000000880)="7116976428203587543bbc1562b772328507b45f649b278def9a0759738087a5d38c0172c5b11f32cfe1490600860cf613aaae2bb333590dcb6f20e4c6f1b04e62832c521f249fc69a8f2a36762f9f454b568187edba3e371cf1a6c76496", 0x5e, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x45a) write$binfmt_elf64(r0, &(0x7f0000001400)=ANY=[@ANYBLOB="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"], 0xbba) ioctl$RTC_UIE_ON(r1, 0x7003) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000280)={{&(0x7f0000000a00)=""/244, 0xf4}, &(0x7f0000000200), 0x20}, 0x20) 03:33:30 executing program 3: clock_gettime(0xffffffffffffffbe, &(0x7f0000000380)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000004c0)=ANY=[]) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, &(0x7f0000000080), &(0x7f0000000140)}, &(0x7f0000000180)=0x78) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000700)=0xc) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000740)={0xa0}, 0xa0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000600)={@empty, @ipv4={[], [], @local}, @remote}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) pipe(&(0x7f0000000480)) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:30 executing program 4: syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x3, 0x240000) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f00000003c0)={0x7, 0x6d, 0x2}, 0x7) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000900)="173074fb8c62c7934719212e2502da2d2f2a5736bcec670f5da0de3b165e6999d4d12b2a1bf0c14ea0a482a6a489facd33e339ac611aa3", 0x37, 0x7fffffff, &(0x7f0000000340)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) r2 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3f, 0x200500) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000940)) accept$alg(r2, 0x0, 0x0) gettid() recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendto$inet6(0xffffffffffffffff, &(0x7f0000000880)="7116976428203587543bbc1562b772328507b45f649b278def9a0759738087a5d38c0172c5b11f32cfe1490600860cf613aaae2bb333590dcb6f20e4c6f1b04e62832c521f249fc69a8f2a36762f9f454b568187edba3e371cf1a6c76496", 0x5e, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="7f454c4600706a5ce1a2ee467d3bca22f507643a066104010000000000000200000000000040000000000000000c02000000000000a6d10000030038000200ffffffff468051e57464030000000300000000000000bc08000000000000f9ffffffffffffffff7f0000000000000600000000000000000800000000000005000000020000006f000000000000000000000000000000ea2b000000000000080000000000000003000000000000000800000000000000f8d1cf6bc8252c025b5f92a84bb4d5efd7201c0b3858f135eeae2dc7f0e87b4cb7c2ebe8e1bf26d90204e8796ae2234ab4507f89e0a927c56e06ac8486242f23306477b3ced713f3ccd7a0f1572c2cfeceaf21bfb67974157e7a4e10510b1d74ca0f796a92f62c8102c33ef139e0cf2ccd4388e8404194afc7dcb3c0580904a76736e493f5c3e2c8d91d510485793916f26e041f6b30857e8c9b55fe64259328116a71513c065b05319d42f98f000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000008f0000000000000000000000000000000000000000000000000000000000000000000000000000001e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e1ff00000000000000000000000000000000000000000000000000db0000000000000000000000000000000000000000bb4243dbcbc2188b0017487b2e533a58643fe24b175f8e919e52849e39389043525d3ddd494ae985e53468473c711971a0f1c6201ef789867a6a6a43da1331e65f4e1a7c88aea52f23a6494510e240ed0b839a8ffb1e95afe210cd60467c1192a1c88027aed995e0b380cfde5b43203edc98da95e2a230873df201f1d2c5b9afa2a163e85dd75b2733d7061889089388ca552942e1daf09ced67f63454488474926f7c2159861ed5ba97392ab124be8caa"], 0x45a) write$binfmt_elf64(r0, &(0x7f0000001400)=ANY=[@ANYBLOB="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"], 0xbba) ioctl$RTC_UIE_ON(r1, 0x7003) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000280)={{&(0x7f0000000a00)=""/244, 0xf4}, &(0x7f0000000200), 0x20}, 0x20) 03:33:30 executing program 0: syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x3, 0x240000) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f00000003c0)={0x7, 0x6d, 0x2}, 0x7) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000900)="173074fb8c62c7934719212e2502da2d2f2a5736bcec670f5da0de3b165e6999d4d12b2a1bf0c14ea0a482a6a489facd33e339ac611aa3", 0x37, 0x7fffffff, &(0x7f0000000340)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) r2 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3f, 0x200500) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000940)) accept$alg(r2, 0x0, 0x0) gettid() recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendto$inet6(0xffffffffffffffff, &(0x7f0000000880)="7116976428203587543bbc1562b772328507b45f649b278def9a0759738087a5d38c0172c5b11f32cfe1490600860cf613aaae2bb333590dcb6f20e4c6f1b04e62832c521f249fc69a8f2a36762f9f454b568187edba3e371cf1a6c76496", 0x5e, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="7f454c4600706a5ce1a2ee467d3bca22f507643a066104010000000000000200000000000040000000000000000c02000000000000a6d10000030038000200ffffffff468051e57464030000000300000000000000bc08000000000000f9ffffffffffffffff7f0000000000000600000000000000000800000000000005000000020000006f000000000000000000000000000000ea2b000000000000080000000000000003000000000000000800000000000000f8d1cf6bc8252c025b5f92a84bb4d5efd7201c0b3858f135eeae2dc7f0e87b4cb7c2ebe8e1bf26d90204e8796ae2234ab4507f89e0a927c56e06ac8486242f23306477b3ced713f3ccd7a0f1572c2cfeceaf21bfb67974157e7a4e10510b1d74ca0f796a92f62c8102c33ef139e0cf2ccd4388e8404194afc7dcb3c0580904a76736e493f5c3e2c8d91d510485793916f26e041f6b30857e8c9b55fe64259328116a71513c065b05319d42f98f000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000008f0000000000000000000000000000000000000000000000000000000000000000000000000000001e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e1ff00000000000000000000000000000000000000000000000000db0000000000000000000000000000000000000000bb4243dbcbc2188b0017487b2e533a58643fe24b175f8e919e52849e39389043525d3ddd494ae985e53468473c711971a0f1c6201ef789867a6a6a43da1331e65f4e1a7c88aea52f23a6494510e240ed0b839a8ffb1e95afe210cd60467c1192a1c88027aed995e0b380cfde5b43203edc98da95e2a230873df201f1d2c5b9afa2a163e85dd75b2733d7061889089388ca552942e1daf09ced67f63454488474926f7c2159861ed5ba97392ab124be8caa"], 0x45a) write$binfmt_elf64(r0, &(0x7f0000001400)=ANY=[@ANYBLOB="7f454c4600250000050000000000000003003e00060000002c010000000000004000000000000000e1000000000000000500000087003800020002000700ea000200007001000000ea0a000000000000f7ffffffffffffff00000000ffffffff00000000000000000100000001000400010000000000000001000070040000000500000000000000000000000000000005000000000000000100000001000000ff0f00000000000000fcfffffffffffff423273d395b5dfe49a633eb0eb0263328129db30c89d614ca312379424593d1149401363a977a2b10bc8394762bab422771360aa38dc889b26829f721e3098b0f80c2f4ee55bcf0df04911af0a6a16e0ab5b5bb1e2227df0cb7b403be567ea3b9adef738dd4b7efbd9e56dfc0dc488a064d4ad246d477bc8fedb6c1fbcdb1469e544a6ac9afa9987b94c8d1209a41a79416931a8f43bd761418a2c47221a2a4d6bee2592cd6eab8fa3ac582965b48d68fb1dde708c9901874b0f1628c0adf0dc15872d102a327e9f073a52942892de4cc87c25e76cde841dd1e09db3f59955450018b682981af9bf3133a11fbf7915b41105bd663e6f7116777b3cb43f260d25a06d22119ca7674f7d9eeb496cccae5ea73758600072b6f0c2a040000002001cb9377fbc132be60c8b0bf6ac0a892b355685d62cb7077a1e889c359d7bfc544111c6ca232e6c6593a0b8f085567b065536d649fea6d4e202255fc1a0dedba780af208b0457ed33958cfd97c0155f59b06d997423bb3b6f3d5e01c8b74030434cacb0e508ef261aff03a72021b6011f6ff05f6070f0bcb7d75cbf1668562cd6599dcf1eac792c47370ac83b2730215d9955f6fa81f59d3209fbaf52f41f8c413432d976fe6eb3ae98661de6250e09bcf7b82d0492b349ca022abe346a443d41aa83ba7d2ed5193dda7e9c78769b1430e5a171e12e0fa1d057e1aef4b856ab0f2dabc8b207f09d78e1f83461ccac0b2558732ea70d369973971d2c6d94081f33308b1e4b27a2ce6f45838809407045aa63b07372728d2aabbb752eb506219d82564c7323f73bfc2260fd95e5e8eeca550b29adcca477de69469764858d7aa3ab8afd99e883c43dacae12ac88e7fea5a99df90755e5caf59185794ed6419a22fe36d9070ed6558b090cb871914491e2a135047b729107896b784bf87c941f7b993033898b993c83b8bcec93aed20e900921e8c8e65939b23a0f84c837a71633aad5664665e7f89839258d1477a2e8fceaa9280b9c9dc53b5ed4bd907c3948f04ac1eff961bf3040ae0faed3985bccc355506dfcd52907750828fc988e60aec5b577af9769cebc8d6e87a826826f8362c84fe7ec9e6d3cc39c1b6b6b9005eaaf0d9037fa576757018d3f60fbab576284cd7343e70a4b8143dc67e94c1090b7376eec330f5995c4b3a119646b4a953cf0669d6e52264827bbbae2c7565529a68f46f5e1a23137059867d0192caf6b22e2d74f8fbe12a139bc90a0d12b6acc0a106ba4fd2baf87c254bb540835206fc5f63dbc82581cec68813c331af00086cae971610587c4683d5f1b0dd68b8a419f581f0387cc9d1a435e329a0595d73a4489b1ea23c331ca752bfd46de13faee26e7e2e9b11dd7151883ac8112c0ba049070bcf00881cc0a37395f1a102cddda4b0b903b0233461e70254e6a75b9c29c02fce51b630d5cd58867e5f8e5b47fdb2fb53e0b9485f1079ddb39d7b3ef5d8d37be9a08714575e454274581a8ad758ba53da32d2c893e8a40de0febf31f84016558a9db7c53dec27895d69fa1a34e4b5b856f4d0974a9dd4031e28632a245b921a576f1a19f47d7ba08e9ca94a7ae46c89b379d90e0dfdcffb790586d920ea79f94af735aa51695dfe0c9c73a44b277e877b473b43f5c3a960d7c5e22678ab3f7cf46bdf23cbbd31df613827f8e23f7b2c71be25eab7dbd56f7b426b78f8e5afe72366ffcd05c29b92ad591e35a19df805a2b89b9b87a13109c19ea941e9b9f6ee1c47708870abfda2debce7eae0f356bc896a5a207f6bc3ed4186117e1ae9b861d3a9a94520a6df99fd700c6fc3b82467a1257c2040dd34b2fb30c032224e6b864900f93168e387edaeeedaebf8b7b40d4caaa97c85229e63770ced3382013fd11010d0ee46333666aaec98aacc511c92be9e55eee400c74ab4614552624ad88f5d63b6f87e85826ee7cf6f15418f9712c6d07f36a54f097d9bc48b3035ae569af4753e7831dc520fe4726d0c96d0cb7b45e5ca5002884d38ed8e8ead8d4a7da76f9bcfd848fd27345bec7dd4356ef7b11a0cd3113bd9c581e7e647eddd060553fd6e9194bc07ffc5ca9eb6e9ce36aa545ac0f6e242e381282522481668f05909a69db9c8f417ce2406fb727c11fa8ed3ec6f097fed51414f3286075c414753979f58a70d97539c1215ad15f4f24e9921c3fc4636f4fb616d5b871cbdc9cb27e00245bb2291f767d4c581387a63022c727026043c0180a848edd1c3fffff21c3fe0b11c65caca8941959536882277e3dc9e61da52527a24e2d79a497a80b33b24f1ca184d56ad13194867d7a0a424977b5f256a4643460a03007ccf2abb042c6a8f357e8c67298f4ee68fa10d82aeec9c63884f43927692db04bfa6651a630ff1e945d5c2ceb1552d0cd69830f257e5d2b500e4447f03edc78938d82871b7075be875dee546cd23ae617356f51fe8f1fb11417e63a436d7ca0ecd22fab3719ab5b4a4fa0ac2b6a44002fdddb61f7d6fe2beac291455b144cff1da4cb487c430a42cd6dee2b0752536175bdeb3abf2a393823dddf4567d7a6ac785662eb272ea9ea223e0d63a2d027fc3bfa6da9c1537a5c207c9f2495bd45ee28be938ad3dbdadee778875ba641ceb20f3fb23d57269a4e40e0baea56d0b4247f12ebb7cf6ee0e64b0d521c8636ca845287f752adfde004e37bee0451540bcabf455b43233e287e4ce36ebbf2cf0aa8325b72b90c40cc5bdf77f66b07bf5423a80409e1e95424e2d63c09e621354d87d29d28758c290f29746e00e72e1f6ee9fc93841a7a4ec7420c1d78c09f9355b41c5b6a2e94d84218428a4e4e40bcab84f0cdc9a230101146a11e1f36367b4b5f21e76b5e58c31aec27a47e7ce6c22d29c553f03d0515199b541750e92718c53542cb8c0e4202c89b5bc2a4e3cd4fd1e33ba846b2d2d1c94d2e73327b1d327fe80ff1113634e2e94769b97a1088c2f00001fd26ffbf3b4b82036e960a01efd1eecb0e4cff79c5943cb7f3390757f2ebaa20ac131cddf19065dad03237cca7406b5c30228494fe25d9d26631795f3b0a16ac6c8c27e37a75bce127c592beed29fe6137efe5ac28a2a89597db794c570055e318e92f17f36e3fcbc68c8233d2f0c433f9e11b2819ade8026682c9c966d13605ba9cfa66d91f8203260ed06d8c53912b2c25be01165ebda24e3b70c4fa4a99c56470ee400000092272d6ba4a0906d5b8df7039b82bf83378b78ce124aca8b7944fffdd65bfca51e33614282fb1738dd43c6b95f2bc5e9b24605ff3fb5a06ece40c2c4a86b93acdde534777d47c5196e7ef7d65ff45606324b402aa6b81afa463f63f96bc442cd25a033b7b6feed08de0f00bccb16c439813c6c4b1d1733bb55a6245a9180ec71a7f31631613c60af161f5ef64493b859a6c4baa9e3811250984db538169178a4f4cb4141f74e366a28b4fdeef59bb22f6f525c493912a044bd99a3b4b86b2834a40437d58d4292a22a730b6a2e5ec7bf358c2016326fff4889d5d5e1beec898a3888d0f4a450d86548a1a9b1cc1bee45e6a4e2c4e0c8d69a51d46190755bd42c1e53d4a1f80010da651d6c500a066afa9c98755acf643ff381af66742c6e091746c77e0f14f2583d6d70339ed50e9da34a0aa8820359872132179f087f16cdaf3636688927e39a857a99f911d08406b6addefa9f895f3b29812234eaf4d5a93b9363fa02a4ee9fe8676811004fabc8121f7639e9f92c0d7f796a6355e984d7a85aadc638b3b17d74fa96eb571516eb1a9fc487e918956411823e1edef555a61ba7d45931457b221bdcc8aaad58e8007497a8846278e0aed68926d3ea9fd96a89ccc89627c86da315c3eb5445bf799df613befe958390660f6c9f7ac02e3187100f18eb3bfacf9662601fc9868329b3524cb8c07850726355bd748f7c51b32e6c4341676cef6af55351e599d196d38d63bf0cd20b85f4bc79a2895b9c5c4d46090b4e1a10394f8ba7201d45d3"], 0xbba) ioctl$RTC_UIE_ON(r1, 0x7003) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000280)={{&(0x7f0000000a00)=""/244, 0xf4}, &(0x7f0000000200), 0x20}, 0x20) 03:33:30 executing program 1: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) shmdt(0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/urandom\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000004c0), 0x10) set_mempolicy(0x0, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000440)=""/34) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:30 executing program 2: eventfd(0x0) inotify_init() seccomp(0x1, 0x0, &(0x7f0000002200)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) add_key(&(0x7f0000000180)='blacklist\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340), &(0x7f00000004c0)='rxrpc\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000640)='big_key\x00', &(0x7f0000000800), &(0x7f00000009c0), 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'bond_slave_1\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000dc0)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001080)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001180)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f00000011c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001200)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001240)={{{@in6=@mcast2, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000001340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001380)={@multicast1, @multicast2}, &(0x7f00000013c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001400)={{{@in6=@local, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001500)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @local}, &(0x7f0000001580)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in6=@mcast1, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000001740)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f00000018c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001900)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a00)={{{@in=@loopback, @in=@remote}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000001b00)=0xe8) recvmmsg(0xffffffffffffff9c, &(0x7f00000044c0), 0x0, 0x0, &(0x7f0000004680)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000046c0)={@local, @local}, &(0x7f0000004700)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004740)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004780)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@multicast2}}, &(0x7f0000004880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000048c0)={'team0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000004900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004980)=0x80, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005100)={&(0x7f0000000100), 0xc, &(0x7f00000050c0)={&(0x7f00000049c0)={0x14}, 0x14}}, 0x0) request_key(&(0x7f0000000440)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000400)='*#(-nodev@\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() pipe2(&(0x7f0000000040), 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x351}, 0x28) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:31 executing program 3: clock_gettime(0xffffffffffffffbe, &(0x7f0000000380)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000004c0)=ANY=[]) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, &(0x7f0000000080), &(0x7f0000000140)}, &(0x7f0000000180)=0x78) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000700)=0xc) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000740)={0xa0}, 0xa0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000600)={@empty, @ipv4={[], [], @local}, @remote}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) pipe(&(0x7f0000000480)) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:31 executing program 4: syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x3, 0x240000) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f00000003c0)={0x7, 0x6d, 0x2}, 0x7) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000900)="173074fb8c62c7934719212e2502da2d2f2a5736bcec670f5da0de3b165e6999d4d12b2a1bf0c14ea0a482a6a489facd33e339ac611aa3", 0x37, 0x7fffffff, &(0x7f0000000340)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) r2 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3f, 0x200500) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000940)) accept$alg(r2, 0x0, 0x0) gettid() recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendto$inet6(0xffffffffffffffff, &(0x7f0000000880)="7116976428203587543bbc1562b772328507b45f649b278def9a0759738087a5d38c0172c5b11f32cfe1490600860cf613aaae2bb333590dcb6f20e4c6f1b04e62832c521f249fc69a8f2a36762f9f454b568187edba3e371cf1a6c76496", 0x5e, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x45a) write$binfmt_elf64(r0, &(0x7f0000001400)=ANY=[@ANYBLOB="7f454c4600250000050000000000000003003e00060000002c010000000000004000000000000000e1000000000000000500000087003800020002000700ea000200007001000000ea0a000000000000f7ffffffffffffff00000000ffffffff00000000000000000100000001000400010000000000000001000070040000000500000000000000000000000000000005000000000000000100000001000000ff0f00000000000000fcfffffffffffff423273d395b5dfe49a633eb0eb0263328129db30c89d614ca312379424593d1149401363a977a2b10bc8394762bab422771360aa38dc889b26829f721e3098b0f80c2f4ee55bcf0df04911af0a6a16e0ab5b5bb1e2227df0cb7b403be567ea3b9adef738dd4b7efbd9e56dfc0dc488a064d4ad246d477bc8fedb6c1fbcdb1469e544a6ac9afa9987b94c8d1209a41a79416931a8f43bd761418a2c47221a2a4d6bee2592cd6eab8fa3ac582965b48d68fb1dde708c9901874b0f1628c0adf0dc15872d102a327e9f073a52942892de4cc87c25e76cde841dd1e09db3f59955450018b682981af9bf3133a11fbf7915b41105bd663e6f7116777b3cb43f260d25a06d22119ca7674f7d9eeb496cccae5ea73758600072b6f0c2a040000002001cb9377fbc132be60c8b0bf6ac0a892b355685d62cb7077a1e889c359d7bfc544111c6ca232e6c6593a0b8f085567b065536d649fea6d4e202255fc1a0dedba780af208b0457ed33958cfd97c0155f59b06d997423bb3b6f3d5e01c8b74030434cacb0e508ef261aff03a72021b6011f6ff05f6070f0bcb7d75cbf1668562cd6599dcf1eac792c47370ac83b2730215d9955f6fa81f59d3209fbaf52f41f8c413432d976fe6eb3ae98661de6250e09bcf7b82d0492b349ca022abe346a443d41aa83ba7d2ed5193dda7e9c78769b1430e5a171e12e0fa1d057e1aef4b856ab0f2dabc8b207f09d78e1f83461ccac0b2558732ea70d369973971d2c6d94081f33308b1e4b27a2ce6f45838809407045aa63b07372728d2aabbb752eb506219d82564c7323f73bfc2260fd95e5e8eeca550b29adcca477de69469764858d7aa3ab8afd99e883c43dacae12ac88e7fea5a99df90755e5caf59185794ed6419a22fe36d9070ed6558b090cb871914491e2a135047b729107896b784bf87c941f7b993033898b993c83b8bcec93aed20e900921e8c8e65939b23a0f84c837a71633aad5664665e7f89839258d1477a2e8fceaa9280b9c9dc53b5ed4bd907c3948f04ac1eff961bf3040ae0faed3985bccc355506dfcd52907750828fc988e60aec5b577af9769cebc8d6e87a826826f8362c84fe7ec9e6d3cc39c1b6b6b9005eaaf0d9037fa576757018d3f60fbab576284cd7343e70a4b8143dc67e94c1090b7376eec330f5995c4b3a119646b4a953cf0669d6e52264827bbbae2c7565529a68f46f5e1a23137059867d0192caf6b22e2d74f8fbe12a139bc90a0d12b6acc0a106ba4fd2baf87c254bb540835206fc5f63dbc82581cec68813c331af00086cae971610587c4683d5f1b0dd68b8a419f581f0387cc9d1a435e329a0595d73a4489b1ea23c331ca752bfd46de13faee26e7e2e9b11dd7151883ac8112c0ba049070bcf00881cc0a37395f1a102cddda4b0b903b0233461e70254e6a75b9c29c02fce51b630d5cd58867e5f8e5b47fdb2fb53e0b9485f1079ddb39d7b3ef5d8d37be9a08714575e454274581a8ad758ba53da32d2c893e8a40de0febf31f84016558a9db7c53dec27895d69fa1a34e4b5b856f4d0974a9dd4031e28632a245b921a576f1a19f47d7ba08e9ca94a7ae46c89b379d90e0dfdcffb790586d920ea79f94af735aa51695dfe0c9c73a44b277e877b473b43f5c3a960d7c5e22678ab3f7cf46bdf23cbbd31df613827f8e23f7b2c71be25eab7dbd56f7b426b78f8e5afe72366ffcd05c29b92ad591e35a19df805a2b89b9b87a13109c19ea941e9b9f6ee1c47708870abfda2debce7eae0f356bc896a5a207f6bc3ed4186117e1ae9b861d3a9a94520a6df99fd700c6fc3b82467a1257c2040dd34b2fb30c032224e6b864900f93168e387edaeeedaebf8b7b40d4caaa97c85229e63770ced3382013fd11010d0ee46333666aaec98aacc511c92be9e55eee400c74ab4614552624ad88f5d63b6f87e85826ee7cf6f15418f9712c6d07f36a54f097d9bc48b3035ae569af4753e7831dc520fe4726d0c96d0cb7b45e5ca5002884d38ed8e8ead8d4a7da76f9bcfd848fd27345bec7dd4356ef7b11a0cd3113bd9c581e7e647eddd060553fd6e9194bc07ffc5ca9eb6e9ce36aa545ac0f6e242e381282522481668f05909a69db9c8f417ce2406fb727c11fa8ed3ec6f097fed51414f3286075c414753979f58a70d97539c1215ad15f4f24e9921c3fc4636f4fb616d5b871cbdc9cb27e00245bb2291f767d4c581387a63022c727026043c0180a848edd1c3fffff21c3fe0b11c65caca8941959536882277e3dc9e61da52527a24e2d79a497a80b33b24f1ca184d56ad13194867d7a0a424977b5f256a4643460a03007ccf2abb042c6a8f357e8c67298f4ee68fa10d82aeec9c63884f43927692db04bfa6651a630ff1e945d5c2ceb1552d0cd69830f257e5d2b500e4447f03edc78938d82871b7075be875dee546cd23ae617356f51fe8f1fb11417e63a436d7ca0ecd22fab3719ab5b4a4fa0ac2b6a44002fdddb61f7d6fe2beac291455b144cff1da4cb487c430a42cd6dee2b0752536175bdeb3abf2a393823dddf4567d7a6ac785662eb272ea9ea223e0d63a2d027fc3bfa6da9c1537a5c207c9f2495bd45ee28be938ad3dbdadee778875ba641ceb20f3fb23d57269a4e40e0baea56d0b4247f12ebb7cf6ee0e64b0d521c8636ca845287f752adfde004e37bee0451540bcabf455b43233e287e4ce36ebbf2cf0aa8325b72b90c40cc5bdf77f66b07bf5423a80409e1e95424e2d63c09e621354d87d29d28758c290f29746e00e72e1f6ee9fc93841a7a4ec7420c1d78c09f9355b41c5b6a2e94d84218428a4e4e40bcab84f0cdc9a230101146a11e1f36367b4b5f21e76b5e58c31aec27a47e7ce6c22d29c553f03d0515199b541750e92718c53542cb8c0e4202c89b5bc2a4e3cd4fd1e33ba846b2d2d1c94d2e73327b1d327fe80ff1113634e2e94769b97a1088c2f00001fd26ffbf3b4b82036e960a01efd1eecb0e4cff79c5943cb7f3390757f2ebaa20ac131cddf19065dad03237cca7406b5c30228494fe25d9d26631795f3b0a16ac6c8c27e37a75bce127c592beed29fe6137efe5ac28a2a89597db794c570055e318e92f17f36e3fcbc68c8233d2f0c433f9e11b2819ade8026682c9c966d13605ba9cfa66d91f8203260ed06d8c53912b2c25be01165ebda24e3b70c4fa4a99c56470ee400000092272d6ba4a0906d5b8df7039b82bf83378b78ce124aca8b7944fffdd65bfca51e33614282fb1738dd43c6b95f2bc5e9b24605ff3fb5a06ece40c2c4a86b93acdde534777d47c5196e7ef7d65ff45606324b402aa6b81afa463f63f96bc442cd25a033b7b6feed08de0f00bccb16c439813c6c4b1d1733bb55a6245a9180ec71a7f31631613c60af161f5ef64493b859a6c4baa9e3811250984db538169178a4f4cb4141f74e366a28b4fdeef59bb22f6f525c493912a044bd99a3b4b86b2834a40437d58d4292a22a730b6a2e5ec7bf358c2016326fff4889d5d5e1beec898a3888d0f4a450d86548a1a9b1cc1bee45e6a4e2c4e0c8d69a51d46190755bd42c1e53d4a1f80010da651d6c500a066afa9c98755acf643ff381af66742c6e091746c77e0f14f2583d6d70339ed50e9da34a0aa8820359872132179f087f16cdaf3636688927e39a857a99f911d08406b6addefa9f895f3b29812234eaf4d5a93b9363fa02a4ee9fe8676811004fabc8121f7639e9f92c0d7f796a6355e984d7a85aadc638b3b17d74fa96eb571516eb1a9fc487e918956411823e1edef555a61ba7d45931457b221bdcc8aaad58e8007497a8846278e0aed68926d3ea9fd96a89ccc89627c86da315c3eb5445bf799df613befe958390660f6c9f7ac02e3187100f18eb3bfacf9662601fc9868329b3524cb8c07850726355bd748f7c51b32e6c4341676cef6af55351e599d196d38d63bf0cd20b85f4bc79a2895b9c5c4d46090b4e1a10394f8ba7201d45d3"], 0xbba) ioctl$RTC_UIE_ON(r1, 0x7003) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000280)={{&(0x7f0000000a00)=""/244, 0xf4}, &(0x7f0000000200), 0x20}, 0x20) 03:33:31 executing program 5: keyctl$set_reqkey_keyring(0x4, 0xfffffffd) futex(&(0x7f0000000ac0), 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000540)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/ppp\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000440)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000480)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000004c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000c00)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/rtc0\x00', 0x0, 0x0) getresuid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000a00)={0x90}, 0x90) setresgid(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) syz_open_dev$sndpcmc(&(0x7f0000000640)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000600)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540), &(0x7f0000000580)=0x4) getgid() setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000007c0)={'filter\x00', 0x4}, 0x68) clock_gettime(0x0, &(0x7f0000000500)) write$input_event(0xffffffffffffffff, &(0x7f0000000900), 0x18) getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xfffffffffffffff9) connect$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000680)) 03:33:31 executing program 0: syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x3, 0x240000) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f00000003c0)={0x7, 0x6d, 0x2}, 0x7) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000900)="173074fb8c62c7934719212e2502da2d2f2a5736bcec670f5da0de3b165e6999d4d12b2a1bf0c14ea0a482a6a489facd33e339ac611aa3", 0x37, 0x7fffffff, &(0x7f0000000340)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) r2 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3f, 0x200500) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000940)) accept$alg(r2, 0x0, 0x0) gettid() recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) sendto$inet6(0xffffffffffffffff, &(0x7f0000000880)="7116976428203587543bbc1562b772328507b45f649b278def9a0759738087a5d38c0172c5b11f32cfe1490600860cf613aaae2bb333590dcb6f20e4c6f1b04e62832c521f249fc69a8f2a36762f9f454b568187edba3e371cf1a6c76496", 0x5e, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="7f454c4600706a5ce1a2ee467d3bca22f507643a066104010000000000000200000000000040000000000000000c02000000000000a6d10000030038000200ffffffff468051e57464030000000300000000000000bc08000000000000f9ffffffffffffffff7f0000000000000600000000000000000800000000000005000000020000006f000000000000000000000000000000ea2b000000000000080000000000000003000000000000000800000000000000f8d1cf6bc8252c025b5f92a84bb4d5efd7201c0b3858f135eeae2dc7f0e87b4cb7c2ebe8e1bf26d90204e8796ae2234ab4507f89e0a927c56e06ac8486242f23306477b3ced713f3ccd7a0f1572c2cfeceaf21bfb67974157e7a4e10510b1d74ca0f796a92f62c8102c33ef139e0cf2ccd4388e8404194afc7dcb3c0580904a76736e493f5c3e2c8d91d510485793916f26e041f6b30857e8c9b55fe64259328116a71513c065b05319d42f98f000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000008f0000000000000000000000000000000000000000000000000000000000000000000000000000001e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e1ff00000000000000000000000000000000000000000000000000db0000000000000000000000000000000000000000bb4243dbcbc2188b0017487b2e533a58643fe24b175f8e919e52849e39389043525d3ddd494ae985e53468473c711971a0f1c6201ef789867a6a6a43da1331e65f4e1a7c88aea52f23a6494510e240ed0b839a8ffb1e95afe210cd60467c1192a1c88027aed995e0b380cfde5b43203edc98da95e2a230873df201f1d2c5b9afa2a163e85dd75b2733d7061889089388ca552942e1daf09ced67f63454488474926f7c2159861ed5ba97392ab124be8caa"], 0x45a) write$binfmt_elf64(r0, &(0x7f0000001400)=ANY=[@ANYBLOB="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"], 0xbba) ioctl$RTC_UIE_ON(r1, 0x7003) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000280)={{&(0x7f0000000a00)=""/244, 0xf4}, &(0x7f0000000200), 0x20}, 0x20) 03:33:31 executing program 3: clock_gettime(0xffffffffffffffbe, &(0x7f0000000380)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000004c0)=ANY=[]) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, &(0x7f0000000080), &(0x7f0000000140)}, &(0x7f0000000180)=0x78) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000700)=0xc) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000740)={0xa0}, 0xa0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000600)={@empty, @ipv4={[], [], @local}, @remote}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) pipe(&(0x7f0000000480)) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:32 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xfffffffe) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000300)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x7530}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) listen(0xffffffffffffffff, 0x0) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000380), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) arch_prctl(0x0, &(0x7f0000000480)) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000440)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) prctl$setmm(0x23, 0x0, &(0x7f0000ffb000/0x4000)=nil) syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, &(0x7f0000001b00), 0x0, &(0x7f0000001c00)) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, 0x1c) openat$null(0xffffffffffffff9c, &(0x7f0000001c80)='/dev/null\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) rt_sigsuspend(&(0x7f0000000000), 0x8) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f00000003c0)) 03:33:32 executing program 2: clock_gettime(0x6, &(0x7f0000000380)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) memfd_create(&(0x7f0000000040)='/dev/sequencer2\x00', 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000340)) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, &(0x7f0000000240)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/47) chmod(&(0x7f0000000180)='./file0\x00', 0x0) getitimer(0x0, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28f36f0460fbaa945d76ea600c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 03:33:32 executing program 4: keyctl$set_reqkey_keyring(0x5, 0xb000400) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) 03:33:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x5, 0x400000bff, 0x2}, 0x2c) 03:33:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x5, 0x400000bff, 0x2}, 0x2c) 03:33:32 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5eb, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001a80)=ANY=[@ANYBLOB], 0x0) recvmsg$kcm(r0, &(0x7f0000000e00)={&(0x7f0000000c00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c80)=""/135, 0x87}, {&(0x7f0000000d40)=""/120, 0x78}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000, 0xffe0000000000}, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000e40)=r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) 03:33:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x5, 0x400000bff, 0x2}, 0x2c) 03:33:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x5, 0x400000bff, 0x2}, 0x2c) 03:33:32 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000002c0)='./file0\x00', 0x10000a0) umount2(&(0x7f0000000100)='./file0\x00', 0x0) 03:33:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="bf16000000000000b707000001000000487000000000e0ff40000000000000009500000200000000"], &(0x7f00000003c0)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0xe, 0xe3, &(0x7f0000000500)="857676fc0dc8cd2d070417bdebf5", &(0x7f0000000400)=""/227}, 0x28) 03:33:32 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getpgrp(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000480)='sessionid\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], &(0x7f0000000440)) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) getgroups(0x0, &(0x7f00000001c0)) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000200)) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0xe8) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth0_to_team\x00') sched_getscheduler(0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000280), 0x4) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000340)=ANY=[], 0x0, 0x0) ioperm(0x0, 0x0, 0x0) 03:33:33 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000002c0)='./file0\x00', 0x10000a0) umount2(&(0x7f0000000100)='./file0\x00', 0x0) [ 382.614335] gfs2: not a GFS2 filesystem 03:33:33 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000002c0)='./file0\x00', 0x10000a0) umount2(&(0x7f0000000100)='./file0\x00', 0x0) 03:33:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000340)=@ethtool_drvinfo={0x8, "2c3204a2e226bdda8d027e077b7a708246153e9ff94844179ae96e21e4901162", "1a70491ef49a9a48447cfb0b94c66c0c5e4b737c97673eb8d284ff7faf4a2929", "14b893dccea839b0431c2081d1678608c24048041a42371ef50532ab17e5ea8e", "500a408caa41fe46ad6c67a2415e19b9f085b86c59f0bf627f6404477d4d4e28", "86f18f5231320670c9df3f7f195684d78174caf6529c9eb7f2f0f6d8a8a37cc9", "ad276e2cb6208d92b9b237e9"}}) 03:33:33 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000140), &(0x7f0000000180), 0x8) 03:33:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={"6c6f0000000001fff300", 0x0}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000080)=0xad, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000380)={"62707130000b00000000000000faff00", r2}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x502}) creat(&(0x7f0000000340)='./file0\x00', 0x0) setpgid(0x0, 0x0) 03:33:33 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)={&(0x7f0000000780)='./file0\x00'}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0xffffffffffffff81) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0xfffffffffffffcb4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) recvmmsg(0xffffffffffffff9c, &(0x7f0000002fc0), 0x0, 0x0, &(0x7f00000030c0)={0x0, 0x989680}) getsockname(0xffffffffffffff9c, &(0x7f0000003100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003180)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @multicast2}, &(0x7f0000000140)=0x8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003240)={0x0, @multicast2, @multicast1}, &(0x7f0000003280)=0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000005c0)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='team_slave_0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@broadcast, @in=@local}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000033c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000003540)={'veth0_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003640)={'team0\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) getpgrp(0x0) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000640)) getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000007c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000006c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000700)) getpgrp(0x0) sched_getparam(0x0, &(0x7f00000001c0)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @remote}, &(0x7f0000003780)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000037c0)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000038c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000039c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003a00)={@empty, @multicast2}, &(0x7f0000003a40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000003e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003e40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003ec0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003f00)={{{@in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000004000)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004040)={{{@in=@local, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000004140)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004280)={{{@in=@multicast2, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000004380)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000043c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004400)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:33 executing program 3: syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) clock_getres(0x0, &(0x7f0000000240)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000200), 0x4) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f00000003c0)) getegid() write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000500)={0xa0}, 0xa0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0xfffffd9b) getpgid(0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d23502306470f953efa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") accept(0xffffffffffffff9c, &(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1f6) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/14, 0xe) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000300)=@req3, 0x1c) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) 03:33:33 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000002c0)='./file0\x00', 0x10000a0) umount2(&(0x7f0000000100)='./file0\x00', 0x0) 03:33:33 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0xa4}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 03:33:33 executing program 5: keyctl$set_reqkey_keyring(0x2, 0xb000400) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getgid() getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @dev}, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000700)=0xe8) getgroups(0x0, &(0x7f00000007c0)) 03:33:33 executing program 1: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) accept(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000400)=0x80) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'bridge_slave_1\x00'}, 0xffffffffffffff00) request_key(&(0x7f0000000380)='pkcs7_test\x00', &(0x7f0000000480), &(0x7f00000004c0)='lo\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) keyctl$setperm(0x5, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='lo\x00', 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000580), 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000040), 0x4) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x20) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) mremap(&(0x7f0000ce2000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@dev, @in=@local}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6=@mcast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000)={@multicast2, @rand_addr}, &(0x7f0000001040)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a40)={{{@in6=@local, @in=@multicast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000001b40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001bc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f00)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) [ 383.182718] audit: type=1326 audit(2000000014.040:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11622 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:34 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$KVM_SET_CPUID(r0, 0xc0185500, &(0x7f0000000080)={0x120, 0x7a}) [ 383.368651] vhci_hcd: invalid port number 122 03:33:34 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) getitimer(0x0, &(0x7f0000000140)) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpgid(0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000680)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000007c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}}}, &(0x7f00000008c0)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000900)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e80)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000001f80)=0xe8) getegid() lstat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002080)={{{@in6, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000002180)=0xe8) getgroups(0x0, &(0x7f00000021c0)) lstat(&(0x7f0000004dc0)='./file0\x00', &(0x7f0000004e00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e80), &(0x7f0000004ec0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004f00)={{{@in=@multicast2, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000005000)=0xe8) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000005040)={{{@in=@local, @in6=@ipv4={[], [], @dev}}}, {{@in=@dev}}}, &(0x7f0000005140)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000005200)={{{@in6=@loopback, @in6=@ipv4={[], [], @loopback}}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000005300)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005340), &(0x7f0000005380)=0xc) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) getgroups(0x0, &(0x7f0000005480)) getuid() lstat(&(0x7f00000054c0)='./file0\x00', &(0x7f0000005500)) lstat(&(0x7f0000005580)='./file0\x00', &(0x7f00000055c0)) getgroups(0x0, &(0x7f0000005640)) getresuid(&(0x7f0000005680), &(0x7f00000056c0), &(0x7f0000005700)) fstat(0xffffffffffffffff, &(0x7f0000005740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005ac0), &(0x7f0000005b00)=0xc) getgid() geteuid() stat(&(0x7f0000005c00)='./file0\x00', &(0x7f0000005c40)) fstat(0xffffffffffffffff, &(0x7f0000005cc0)) getresgid(&(0x7f0000005d40), &(0x7f0000006dc0), &(0x7f0000006e00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006e40)={{{@in=@broadcast, @in6}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000006f40)=0xe8) getgroups(0x0, &(0x7f0000006f80)) lstat(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000)) fstat(0xffffffffffffffff, &(0x7f0000007080)) getresuid(&(0x7f0000007100), &(0x7f0000007140), &(0x7f0000007180)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f00000072c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000005d80)="428055a0636969ef69dc00d9c421a05d2f8a20c3397c2a0f0fcdae300f3821dffa6925257f41dfe0400f01efe5e57d0fecec1a1a01460f01ee4582dfdfdf") 03:33:34 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x7, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x88}}, 0x0) 03:33:34 executing program 3: syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) clock_getres(0x0, &(0x7f0000000240)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000200), 0x4) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f00000003c0)) getegid() write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000500)={0xa0}, 0xa0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0xfffffd9b) getpgid(0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d23502306470f953efa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") accept(0xffffffffffffff9c, &(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1f6) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/14, 0xe) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000300)=@req3, 0x1c) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) 03:33:34 executing program 4: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x3, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:34 executing program 2: openat$rfkill(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rfkill\x00', 0x400800, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) request_key(&(0x7f0000000540)='syzkaller\x00', &(0x7f0000000580), &(0x7f00000005c0)='-keyring#user.\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000600)='asymmetric\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000780), &(0x7f00000006c0), 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000b00)) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000700), 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000800)=""/178) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380), &(0x7f0000000040), 0x0, 0xfffffffffffffffe) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000008c0)=""/249) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/llc\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 383.889339] audit: type=1326 audit(2000000014.750:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11622 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:34 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) read$eventfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) getsockname(0xffffffffffffffff, &(0x7f00000011c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, &(0x7f0000001240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) dup2(r1, r0) mlockall(0x0) 03:33:34 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "aabc7d", 0x44, 0x0, 0x0, @local, @ipv4={[], [], @dev}, {[], @gre}}}}}, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x32a) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0876969ef69dc00d9f0008f00008020c421fa7fb432322333331f1c3728372838211ac4c19086d9f28fc92665984e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706c4c1c05659009f4b") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000500), 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[]}}, 0x0) getrusage(0x0, &(0x7f0000000b40)) io_setup(0x0, &(0x7f0000000040)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000700)=@getqdisc={0x24}, 0x24}}, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000840)={'security\x00'}, &(0x7f00000008c0)=0x24) 03:33:34 executing program 4: syz_open_dev$midi(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, 0x0, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180), 0x4) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x14, 0x0, 0x0, 0x1ac, 0x0, 0x2, 0x0, 0x5]}}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000140)={@local, @multicast2}, &(0x7f0000000180)=0xc) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'vcan0\x00'}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001a40)={@mcast1}) syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000780), &(0x7f00000007c0)=0x4) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000200), &(0x7f0000000580)=0x4) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='user.syz\x00') ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000001280)) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000800)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc00c5512, &(0x7f0000000040)) pipe2(&(0x7f0000000140), 0x0) symlinkat(&(0x7f0000001440)='./file0\x00', 0xffffffffffffffff, &(0x7f00000014c0)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') [ 384.065022] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:33:35 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) read$eventfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) getsockname(0xffffffffffffffff, &(0x7f00000011c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, &(0x7f0000001240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) dup2(r1, r0) mlockall(0x0) 03:33:35 executing program 0: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000340)) fcntl$getown(0xffffffffffffffff, 0x9) gettid() getpgrp(0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fstatfs(0xffffffffffffffff, &(0x7f00000007c0)=""/4096) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000500)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000280)={0x0, @local, 0x0, 0x0, 'nq\x00'}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:35 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) read$eventfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) getsockname(0xffffffffffffffff, &(0x7f00000011c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, &(0x7f0000001240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) dup2(r1, r0) mlockall(0x0) 03:33:35 executing program 3: syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) clock_getres(0x0, &(0x7f0000000240)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000200), 0x4) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f00000003c0)) getegid() write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000500)={0xa0}, 0xa0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0xfffffd9b) getpgid(0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d23502306470f953efa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") accept(0xffffffffffffff9c, &(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1f6) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/14, 0xe) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000300)=@req3, 0x1c) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) 03:33:35 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) socket$inet(0xa, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:35 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) read$eventfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) getsockname(0xffffffffffffffff, &(0x7f00000011c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, &(0x7f0000001240)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) dup2(r1, r0) mlockall(0x0) 03:33:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1}}}, 0xb8}}, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000000), 0x1d) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8), &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 03:33:35 executing program 4: getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') clock_gettime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000180)) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffff8) keyctl$set_reqkey_keyring(0xe, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@loopback}, 0x14) creat(&(0x7f0000000540)='./file0/file0\x00', 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") inotify_add_watch(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 03:33:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0215151ef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575455f0f2e1a1a010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:36 executing program 5: request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000140)="2c402f73656c696e75781447504c7070703000", 0xffffffffffffffff) request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000240), &(0x7f0000000280)='%ppp0eth1ppp0-[\x00', 0xfffffffffffffffc) add_key(&(0x7f00000002c0)='ceph\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffa) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:36 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000340)={0x1a, 0xffff, 0x0, 0x0, 0x0, 0x401}, 0x10) bind$llc(r1, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1, @dev}, 0x10) connect$llc(r1, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) 03:33:36 executing program 3: syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) clock_getres(0x0, &(0x7f0000000240)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000200), 0x4) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f00000003c0)) getegid() write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000500)={0xa0}, 0xa0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), 0xfffffd9b) getpgid(0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d23502306470f953efa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") accept(0xffffffffffffff9c, &(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1f6) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/14, 0xe) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000300)=@req3, 0x1c) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) [ 385.598414] llc_conn_state_process: llc_conn_service failed [ 385.616573] llc_conn_state_process: llc_conn_service failed 03:33:36 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000340)={0x1a, 0xffff, 0x0, 0x0, 0x0, 0x401}, 0x10) bind$llc(r1, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1, @dev}, 0x10) connect$llc(r1, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) [ 385.787939] llc_conn_state_process: llc_conn_service failed 03:33:36 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) socket$inet(0xa, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:36 executing program 4: getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') clock_gettime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000180)) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffff8) keyctl$set_reqkey_keyring(0xe, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@loopback}, 0x14) creat(&(0x7f0000000540)='./file0/file0\x00', 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") inotify_add_watch(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 03:33:36 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000340)={0x1a, 0xffff, 0x0, 0x0, 0x0, 0x401}, 0x10) bind$llc(r1, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1, @dev}, 0x10) connect$llc(r1, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) [ 386.035885] llc_conn_state_process: llc_conn_service failed 03:33:37 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000340)={0x1a, 0xffff, 0x0, 0x0, 0x0, 0x401}, 0x10) bind$llc(r1, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1, @dev}, 0x10) connect$llc(r1, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) 03:33:37 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x5c}, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) [ 386.219587] llc_conn_state_process: llc_conn_service failed 03:33:37 executing program 2: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000140)) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0xc0145401) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x0, 0x0) 03:33:37 executing program 0: clock_gettime(0x80000000, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000005c0)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000640), 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$packet(0x11, 0x0, 0x300) socket$inet6(0xa, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) time(&(0x7f0000000600)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000340), 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) getitimer(0x0, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:37 executing program 5: memfd_create(&(0x7f0000000440)='/d\x00\x00\x00\x00wr\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000840)) prctl$setname(0xf, &(0x7f0000000380)='/dev/midi#\x00') creat(&(0x7f0000000600)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") 03:33:37 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x0, 0x1) ioctl$TIOCSBRK(r0, 0x40044591) write(r0, &(0x7f0000fdd000), 0x0) 03:33:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x0, 0x18}, 0xfffffffffffffe8b) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x200002, 0x0) 03:33:37 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0xa4, 0x0) write$FUSE_BMAP(r0, &(0x7f0000000280)={0x18, 0xfffffffffffffff5, 0x1}, 0x18) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) signalfd(r1, &(0x7f0000000340)={0x42}, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20, 0x0, 0x0, 0x4, 0x0, 0x0, 0x401}, &(0x7f0000000140)={0x8}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:33:37 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) socket$inet(0xa, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x0, 0x18}, 0xfffffffffffffe8b) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x200002, 0x0) 03:33:37 executing program 4: getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') clock_gettime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000180)) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffff8) keyctl$set_reqkey_keyring(0xe, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@loopback}, 0x14) creat(&(0x7f0000000540)='./file0/file0\x00', 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") inotify_add_watch(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 03:33:37 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) socket$inet(0xa, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='maps\x00') sendfile(r0, r2, &(0x7f0000000240)=0xa00, 0x80040006) r3 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r3, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1004000000016) 03:33:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x0, 0x18}, 0xfffffffffffffe8b) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x200002, 0x0) 03:33:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0xda5) accept$packet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x14) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xfffffffffffffff7}) syz_open_pts(r0, 0x0) write(r0, &(0x7f0000c34fff), 0xfffa) 03:33:38 executing program 0: select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000380)=""/204, &(0x7f0000000280)=0xcc) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000480)={{0x0, @multicast1, 0x0, 0x0, 'lc\x00'}}, 0x44) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) syz_execute_func(&(0x7f0000000300)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) set_mempolicy(0x8001, &(0x7f0000000080)=0x100003, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r1, &(0x7f00000013c0)=[{&(0x7f0000001080)=""/157, 0x9d}], 0x1) 03:33:38 executing program 5: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000080)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x2c0}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000280)) getgroups(0x0, &(0x7f0000000080)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002b40)) getgid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002bc0), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c00), &(0x7f0000002c40)=0xc) getgid() socket$inet6_udplite(0xa, 0x2, 0x88) stat(&(0x7f00000032c0)='./file0\x00', &(0x7f0000003300)) getresgid(&(0x7f0000003380), &(0x7f00000033c0), &(0x7f0000003400)) lstat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) getgroups(0x0, &(0x7f0000003500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003540)={{{@in=@remote, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000003640)=0xe8) getgroups(0x0, &(0x7f0000003680)) getresuid(&(0x7f00000036c0), &(0x7f0000003700), &(0x7f0000003740)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f00)={{{@in6, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004000)=0xe8) lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004100), &(0x7f0000004140)=0xc) getegid() geteuid() getegid() stat(&(0x7f0000004380)='./file1\x00', &(0x7f00000043c0)) 03:33:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='maps\x00') sendfile(r0, r2, &(0x7f0000000240)=0xa00, 0x80040006) r3 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r3, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1004000000016) 03:33:38 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x4c000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x47, 0x1d, 0x2000000000001, 0x0, 0x0, {0x7e}}, 0x64}}, 0x0) 03:33:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x0, 0x18}, 0xfffffffffffffe8b) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x200002, 0x0) [ 387.831249] netlink: 51 bytes leftover after parsing attributes in process `syz-executor2'. [ 387.924991] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:33:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='maps\x00') sendfile(r0, r2, &(0x7f0000000240)=0xa00, 0x80040006) r3 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r3, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1004000000016) [ 388.025052] netlink: 51 bytes leftover after parsing attributes in process `syz-executor2'. 03:33:38 executing program 4: getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') clock_gettime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000180)) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffff8) keyctl$set_reqkey_keyring(0xe, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000003c0)={@loopback}, 0x14) creat(&(0x7f0000000540)='./file0/file0\x00', 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") inotify_add_watch(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000140)) [ 388.096212] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:33:39 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x4c000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x47, 0x1d, 0x2000000000001, 0x0, 0x0, {0x7e}}, 0x64}}, 0x0) 03:33:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = syz_open_procfs(0x0, &(0x7f0000000680)='maps\x00') sendfile(r0, r2, &(0x7f0000000240)=0xa00, 0x80040006) r3 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r3, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1004000000016) 03:33:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f000075cf53), &(0x7f000015dffc), &(0x7f0000b25ffc), &(0x7f0000923000)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000003ff8), 0xa0000004, 0x0) [ 388.319832] netlink: 51 bytes leftover after parsing attributes in process `syz-executor2'. [ 388.352122] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:33:39 executing program 0: getpid() fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000300)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000005080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getpgid(0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000003c0)={{}, 0x0, 0x0, "6964be0000000000000000000000000000000000000000000000000000e7ffffffffffffff00", 'timer0\x00'}) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@mcast2, @in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@local, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000d00)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@local}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000e40)=0xe8) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000f80)=0xe8) stat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) getuid() fstat(0xffffffffffffffff, &(0x7f00000014c0)) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000016c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000017c0)=0xe8) getresgid(&(0x7f0000001800), &(0x7f0000001840), &(0x7f0000001880)) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001d40)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) getegid() getuid() getresgid(&(0x7f0000001e40), &(0x7f0000001e80), &(0x7f0000001ec0)) stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:39 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x4c000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x47, 0x1d, 0x2000000000001, 0x0, 0x0, {0x7e}}, 0x64}}, 0x0) 03:33:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSYMLINK(r0, &(0x7f0000000000)={0x14}, 0x14) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x2}) 03:33:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f000075cf53), &(0x7f000015dffc), &(0x7f0000b25ffc), &(0x7f0000923000)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000003ff8), 0xa0000004, 0x0) 03:33:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f000075cf53), &(0x7f000015dffc), &(0x7f0000b25ffc), &(0x7f0000923000)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000003ff8), 0xa0000004, 0x0) [ 388.676492] netlink: 51 bytes leftover after parsing attributes in process `syz-executor2'. [ 388.704154] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:33:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSYMLINK(r0, &(0x7f0000000000)={0x14}, 0x14) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x2}) 03:33:39 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x4c000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x47, 0x1d, 0x2000000000001, 0x0, 0x0, {0x7e}}, 0x64}}, 0x0) 03:33:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSYMLINK(r0, &(0x7f0000000000)={0x14}, 0x14) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x2}) [ 388.984065] netlink: 51 bytes leftover after parsing attributes in process `syz-executor2'. [ 389.004623] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:33:39 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000340)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000080)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/91, 0x5b) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file1\x00', 0x0) 03:33:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f000075cf53), &(0x7f000015dffc), &(0x7f0000b25ffc), &(0x7f0000923000)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000003ff8), 0xa0000004, 0x0) [ 389.128087] tmpfs: No value for mount option './file0' 03:33:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f000075cf53), &(0x7f000015dffc), &(0x7f0000b25ffc), &(0x7f0000923000)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000003ff8), 0xa0000004, 0x0) 03:33:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RSYMLINK(r0, &(0x7f0000000000)={0x14}, 0x14) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x2}) 03:33:40 executing program 0: clock_getres(0x5, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x1d, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000180)) shmget(0xffffffffffffffff, 0x400000, 0x0, &(0x7f0000c00000/0x400000)=nil) memfd_create(&(0x7f0000000040)='/dev/vsock\x00', 0x0) getpgid(0x0) geteuid() write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000340)={0x7}, 0x7) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000002900)) syz_open_dev$ndb(&(0x7f0000000300)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in6=@loopback, @in6}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000002a80)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) getuid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) getresgid(&(0x7f0000002b00), &(0x7f0000002b40), &(0x7f0000002b80)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002c40)={&(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002840), 0x0, &(0x7f0000002bc0)}, 0x0) getgid() prctl$seccomp(0x16, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) syz_open_dev$sndpcmp(&(0x7f0000000700)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000740)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 03:33:40 executing program 2: prctl$setname(0x23, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sync() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000200)) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000580)) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") 03:33:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0), 0x1c) listen(0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000180)=0x80) openat$ion(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ion\x00', 0x10000, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) fcntl$lock(r1, 0x7, &(0x7f0000000080)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) fcntl$setlease(r1, 0x400, 0x2) 03:33:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f000075cf53), &(0x7f000015dffc), &(0x7f0000b25ffc), &(0x7f0000923000)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000003ff8), 0xa0000004, 0x0) 03:33:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f000075cf53), &(0x7f000015dffc), &(0x7f0000b25ffc), &(0x7f0000923000)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000003ff8), 0xa0000004, 0x0) 03:33:40 executing program 1: ustat(0x3, &(0x7f0000000080)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000200)) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:40 executing program 0: clock_getres(0x5, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:40 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000540)={[{@mode={'mode', 0x3d, 0xdc}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0xd9}}, {@mode={'mode', 0x3d, 0x7f}}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40400, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cr\x00oup/syz1\x00', 0x1ff) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000600)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x10000, &(0x7f0000000480)) mount$bpf(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x7f}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x32}}]}) 03:33:40 executing program 3: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:40 executing program 0: clock_getres(0x5, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:41 executing program 0: clock_getres(0x5, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:41 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000540)={[{@mode={'mode', 0x3d, 0xdc}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0xd9}}, {@mode={'mode', 0x3d, 0x7f}}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40400, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cr\x00oup/syz1\x00', 0x1ff) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000600)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x10000, &(0x7f0000000480)) mount$bpf(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x7f}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x32}}]}) 03:33:41 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000540)={[{@mode={'mode', 0x3d, 0xdc}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0xd9}}, {@mode={'mode', 0x3d, 0x7f}}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40400, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cr\x00oup/syz1\x00', 0x1ff) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000600)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x10000, &(0x7f0000000480)) mount$bpf(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x7f}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x32}}]}) 03:33:41 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000540)={[{@mode={'mode', 0x3d, 0xdc}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0xd9}}, {@mode={'mode', 0x3d, 0x7f}}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40400, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cr\x00oup/syz1\x00', 0x1ff) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000600)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x10000, &(0x7f0000000480)) mount$bpf(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x7f}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x32}}]}) 03:33:41 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='bdev\x00'}, 0x10) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getuid() getgroups(0x0, &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) geteuid() getgroups(0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001640), &(0x7f0000001680)=0xc) getgroups(0x0, &(0x7f00000016c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001700)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001740)={{{@in, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001840)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001880)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900)) fstat(0xffffffffffffffff, &(0x7f0000001940)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000019c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a00)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000001b00)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b40)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001b80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001f00)) getuid() getgroups(0x0, &(0x7f0000001f40)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001f80)) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002080), &(0x7f00000020c0)=0xc) gettid() getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:33:41 executing program 1: ustat(0x3, &(0x7f0000000080)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000200)) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:41 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000540)={[{@mode={'mode', 0x3d, 0xdc}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0xd9}}, {@mode={'mode', 0x3d, 0x7f}}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40400, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cr\x00oup/syz1\x00', 0x1ff) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000600)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x10000, &(0x7f0000000480)) mount$bpf(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x7f}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x32}}]}) 03:33:41 executing program 3: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:41 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000540)={[{@mode={'mode', 0x3d, 0xdc}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0xd9}}, {@mode={'mode', 0x3d, 0x7f}}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40400, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cr\x00oup/syz1\x00', 0x1ff) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000600)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x10000, &(0x7f0000000480)) mount$bpf(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x7f}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x32}}]}) 03:33:41 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000540)={[{@mode={'mode', 0x3d, 0xdc}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0xd9}}, {@mode={'mode', 0x3d, 0x7f}}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40400, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cr\x00oup/syz1\x00', 0x1ff) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000600)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x10000, &(0x7f0000000480)) mount$bpf(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x7f}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x32}}]}) 03:33:42 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000540)={[{@mode={'mode', 0x3d, 0xdc}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0xd9}}, {@mode={'mode', 0x3d, 0x7f}}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40400, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cr\x00oup/syz1\x00', 0x1ff) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000600)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x10000, &(0x7f0000000480)) mount$bpf(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x7f}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x32}}]}) 03:33:42 executing program 0: futex(&(0x7f0000000440), 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000480)='./file0\x00', 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000500), 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='cgroup.type\x00'}, 0x10) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000003c0)) epoll_create1(0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:42 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000540)={[{@mode={'mode', 0x3d, 0xdc}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0xd9}}, {@mode={'mode', 0x3d, 0x7f}}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40400, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cr\x00oup/syz1\x00', 0x1ff) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000600)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x10000, &(0x7f0000000480)) mount$bpf(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x7f}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x32}}]}) 03:33:42 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000540)={[{@mode={'mode', 0x3d, 0xdc}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0xd9}}, {@mode={'mode', 0x3d, 0x7f}}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000a, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40400, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cr\x00oup/syz1\x00', 0x1ff) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000600)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x10000, &(0x7f0000000480)) mount$bpf(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x7f}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x32}}]}) 03:33:42 executing program 1: ustat(0x3, &(0x7f0000000080)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000200)) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:42 executing program 3: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:42 executing program 2: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000240), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='/proc/self/net/pfkey\x00'}, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000280), &(0x7f00000002c0)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f0000000200)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000680)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@remote}, &(0x7f0000000700)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'rose0\x00'}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f00000000c0)=0xc) getgid() setregid(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in6=@ipv4={[], [], @remote}, @in6}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000980)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000a80)={0x0, @empty, @broadcast}, &(0x7f0000000ac0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b00)={@mcast1}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@multicast2, @in=@local}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000c80)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000dc0)=0x14, 0x0) 03:33:43 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setresuid(0x0, 0x0, 0x0) prctl$intptr(0x200000002f, 0x4) 03:33:43 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000a00)='/dev/usbmon#\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) semget(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)) fstat(0xffffffffffffff9c, &(0x7f00000001c0)) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)) getegid() openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000880)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000840)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={0xffffffffffffffff, 0x0, 0x0, 0xd1, &(0x7f0000000880), &(0x7f00000008c0)=""/209}, 0x28) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f0000000700)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000400)=0x388) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a40)=ANY=[], 0x0) getgid() pipe2(&(0x7f00000006c0), 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000800), 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[]}}, 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a00), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b00)="2f70726f632f73315a2f6e65742f697076342f76732f64726f705f7061636b657400034085ec41d4e250992ba5cb1181792bccd34b30b75a843fd8b2dc9d1c717cc0eca3b2724345c0d217e8b80ab8c372726e9e58480c2b81f41bc0002c27d18870f7c36e7cdb7fccb30c10a9d3d84795abd3cd1c3676c4ea82903fec237fedc178ad6f15b6877b55f1df99ae41c42c84b5a95d3a556c08878c86555c5d969aef37e444906a1bb520e06a26b604e8e62ec26d1d86b5ee782f6e", 0x2, 0x0) 03:33:43 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xc, 0x32, 0xffffffffffffffff, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000036c0)={0x53, 0xfffffffffffffffe, 0x6, 0x2, @buffer={0x0, 0xf2, &(0x7f0000000100)=""/242}, &(0x7f0000000240)="af2517703b75", &(0x7f0000000080)=""/115, 0x0, 0x0, 0x0, &(0x7f0000000200)}) 03:33:43 executing program 5: msgget(0xffffffffffffffff, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@remote, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:43 executing program 0: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000340)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) getpgrp(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000180)=0xb) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f00000001c0)={0x28, 0x0, 0x0, @hyper}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0636969ef69dc00d9908a203637c3c4e141617d660fcdae300f38211a40a5647f41dfe0400f01ef7d0f38ec1a1a41d9f5011345dfde9f") 03:33:43 executing program 1: ustat(0x3, &(0x7f0000000080)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000200)) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:43 executing program 3: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:33:43 executing program 2: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getegid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000002c0)=""/233) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") writev(0xffffffffffffffff, &(0x7f00000001c0), 0x0) 03:33:44 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x20011, r0, 0x0) 03:33:44 executing program 5: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) geteuid() getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003c00)={{{@in=@loopback, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000003d00)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d80)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000003e80)=0xe8) getgroups(0x0, &(0x7f0000003ec0)) getpgrp(0xffffffffffffffff) stat(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)) fstat(0xffffffffffffffff, &(0x7f0000003fc0)) getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000004040), &(0x7f0000004080), &(0x7f00000040c0)) stat(&(0x7f0000004100)='./file0\x00', &(0x7f0000004140)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000041c0)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f00000042c0)=0xe8) getgroups(0x0, &(0x7f0000004300)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000004340)) getegid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000057c0)={{{@in=@local, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f00000058c0)=0xe8) stat(&(0x7f0000005900)='./file0\x00', &(0x7f0000005940)) gettid() geteuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000059c0), &(0x7f0000005a00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005a40)={{{@in6=@loopback, @in6=@local}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000005b40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005b80), &(0x7f0000005bc0)=0xc) getpgrp(0x0) 03:33:44 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x200000, 0x0) request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9) msgget(0xffffffffffffffff, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@dev, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000380)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000280)) socket$inet6_dccp(0xa, 0x6, 0x0) dup(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000200)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:44 executing program 4: getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0xffffffffffffffbe) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78997e0f6eeefa39f6a02ffa39f60f38302fc4a10dfbd6450f2e1ac4c10d64ac1e5d31a3b7e2989f7f") 03:33:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000140), 0x4) 03:33:44 executing program 3: keyctl$dh_compute(0x6, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000002f00)=""/4096, &(0x7f0000000600)=0x1321) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mknod$loop(&(0x7f0000006240)='./file0\x00', 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@dev}}}, &(0x7f00000002c0)=0xe8) clock_gettime(0x0, &(0x7f0000006580)) recvmmsg(0xffffffffffffffff, &(0x7f0000006380), 0x0, 0x0, &(0x7f00000065c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006600)={{{@in=@loopback, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000006700)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006740)={{{@in6=@local, @in=@local}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000006840)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006880)={'team_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007d80)={'team0\x00'}) clock_gettime(0x0, &(0x7f000000a300)) recvmmsg(0xffffffffffffffff, &(0x7f000000a280), 0x0, 0x0, &(0x7f000000a340)) accept4$packet(0xffffffffffffffff, &(0x7f000000a380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000a3c0)=0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:33:44 executing program 1: add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) socket$inet_dccp(0x2, 0x6, 0x0) sysinfo(0xfffffffffffffffd) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000240)) fstat(0xffffffffffffffff, &(0x7f00000003c0)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000500)=0xc) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000280)={0x0, @dev, @rand_addr}, &(0x7f00000002c0)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000380)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'veth1_to_bond\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in6=@mcast1, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000002280)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000022c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002300)=0x14) clock_gettime(0x0, &(0x7f0000005580)) recvmmsg(0xffffffffffffffff, &(0x7f0000005480), 0x0, 0x0, &(0x7f00000055c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005600)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000056c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005700)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005ac0)={&(0x7f0000000180), 0xc, &(0x7f0000005a80)={&(0x7f0000005740)=ANY=[]}}, 0x0) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in=@broadcast, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:44 executing program 2: keyctl$set_reqkey_keyring(0x14, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) 03:33:45 executing program 5: sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xe}}, 0x1c) r0 = socket$inet(0x2, 0x80003, 0x5) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in, 0x10, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000000600), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x7f}}], 0x3fe, 0x0) 03:33:45 executing program 5: prctl$setname(0xf, &(0x7f0000000180)="5a70726f632970726f63626465762b18fde9bb683026776c616e306e6f6465767365637572690979275b216574683000") msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) memfd_create(&(0x7f0000000500)='/dev/zero\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000780)={@dev, @rand_addr}, &(0x7f0000000940)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d40)={{{@in=@remote, @in6=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @dev, @multicast2}, &(0x7f0000001e40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004000), &(0x7f0000004040)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004080)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000004180)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000004280), &(0x7f00000042c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004300)={{{@in=@dev, @in=@rand_addr}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000004400)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004cc0)={0x0, @dev, @rand_addr}, &(0x7f0000004d00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000004d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004d80)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000004dc0)={'vcan0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004e00), &(0x7f0000004e40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004f40)={{{@in=@local, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000005040)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000005140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005180)=0x14, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f00000051c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005200)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005240)={{{@in=@dev, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000005340)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005480)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000005580)={'vcan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000005dc0)={&(0x7f0000000600), 0xc, &(0x7f0000005d80)={&(0x7f00000055c0)={0x14}, 0x14}}, 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:45 executing program 0: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @remote}, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000003c0)) getpgrp(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000680)) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:33:45 executing program 4: syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./bus\x00'}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000480), &(0x7f0000000380), &(0x7f00000004c0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) gettid() fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) lstat(&(0x7f00000030c0)='./bus\x00', &(0x7f0000003100)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000031c0)={{{@in6=@dev, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000003380)='./bus\x00', &(0x7f00000033c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) stat(&(0x7f0000003540)='./bus\x00', &(0x7f0000003580)) getresgid(&(0x7f0000003600), &(0x7f0000003640), &(0x7f0000003680)) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000004fc0)='./bus\x00', &(0x7f0000005000)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:45 executing program 3: open_by_handle_at(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="be0000000008000016dd562e1f008bf66869b3641bd1b939f117349e32c13ad38236795625f20d6bd1f477a34bda81f8641cc9f4807c24b67dfefc8dcf27436a8ea067a45b28f367158bf2eb164e459abffeae224ebfac4a930cc22e82a3c7dd9be17049a69f102f733a212af98e605d4c424f94bb9475bc131780f8d2cfce439e4c1bbfba5726b8d63b83b28cd6079a1c7fb15d8de578a0b9ed5cda16c5eb64c74f8ace9e7d5f9e4bb33491434a20dc"], 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000340)={&(0x7f0000000000), 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB], 0x1}}, 0x81) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000000240), 0x8000fffffffe) 03:33:45 executing program 1: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000001540)='IPVS\x00', 0xffffffffffffff9c}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) clock_gettime(0x0, &(0x7f0000001580)) pipe(&(0x7f0000000180)) getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001680)={{{@in=@remote, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000001780)=0xe8) stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:45 executing program 0: gettid() getpid() getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000180)) eventfd(0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 394.802213] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:33:45 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$KVM_SET_CPUID(r0, 0x80045518, &(0x7f00000000c0)={0x1, 0x5f5e0ff, [{}]}) 03:33:45 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480), &(0x7f00000004c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000bc0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000000cc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000ec0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f40)={{{@in=@local, @in6=@mcast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f00000010c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001100)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001140)={@mcast2}, &(0x7f00000012c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001300)={@remote}, &(0x7f0000001340)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@local}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000001700)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001780)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000017c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000018c0), &(0x7f0000001900)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a00)={{{@in=@multicast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000001b00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001b40)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000001c40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c80)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in6=@loopback}}, &(0x7f0000001d80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000020c0)={0x0, @remote, @multicast2}, &(0x7f0000002100)=0xc) accept4(0xffffffffffffffff, &(0x7f0000002140)=@can, &(0x7f00000021c0)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000002200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002240)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002740)=0xffffffc7, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000002780)=@hci, &(0x7f0000002800)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002840)={{{@in=@broadcast, @in=@dev}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000002940)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000029c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000002a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002a80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002b80)={{{@in=@multicast1, @in=@remote}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000002c80)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000040), 0xc, &(0x7f00000035c0)={&(0x7f0000002cc0)={0x14}, 0x14}}, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000640)=ANY=[]}}, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000200)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000300)=0x8) syz_open_procfs(0x0, &(0x7f00000001c0)='net/udplite\x00') ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000780)) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000800)={@multicast2, @dev}, &(0x7f0000000840)=0xc) accept(0xffffffffffffffff, &(0x7f0000000880)=@can, &(0x7f0000000900)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000a40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a80)={'bond0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000ac0)={@multicast1, @rand_addr}, &(0x7f0000000b00)=0xc) 03:33:46 executing program 3: clock_gettime(0x0, &(0x7f0000000300)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000340)) accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000540)=0x14, 0x0) 03:33:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod(&(0x7f00007f2ff8)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000300), 0xc) open(&(0x7f00007ddff8)='./file0\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0xc0189436, &(0x7f0000000fff)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000180)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001000)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000000140), &(0x7f0000000440), &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000840)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000a80)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000080), 0x0, &(0x7f0000000b00)}, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000240)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') 03:33:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_emit_ethernet(0x3a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0xffffff84, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0xffffff94, 0x3}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000040)={0x0, 0x4, [0x0, 0x7c7]}) 03:33:46 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000280)=@ipv4_newaddr={0x28, 0x14, 0x389e63cafcc39927, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_ADDRESS={0x8}, @IFA_LOCAL={0x8, 0x2, @broadcast}]}, 0x28}}, 0x0) 03:33:46 executing program 5: clock_gettime(0x4, &(0x7f0000000500)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) clock_settime(0x0, &(0x7f0000000040)={0x77359400}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @multicast1, @loopback}, &(0x7f0000000480)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'veth1_to_bond\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'rose0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@multicast1, @in=@broadcast}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000008c0)={@local}, &(0x7f0000000900)=0x14) accept4(0xffffffffffffffff, &(0x7f0000000a00)=@hci, &(0x7f0000000a80)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in6, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000bc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002f00)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@local}}, {{@in=@rand_addr}}}, &(0x7f0000003000)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003140)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000031c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003200)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003240)={{{@in6=@dev, @in6=@local}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@local}}, &(0x7f0000003340)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003c40)={0x0, @empty, @remote}, &(0x7f0000003c80)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003cc0)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003d00)={@remote}, &(0x7f0000003d40)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000240), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@getlink={0x30, 0x12, 0x201, 0x0, 0x0, {}, [@IFLA_EXT_MASK={0x8}, @IFLA_IF_NETNSID={0x8}]}, 0x30}}, 0x0) 03:33:20 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='gU'], 0x2) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:33:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCEXCL(r1, 0x540c) ioctl$TCFLSH(r1, 0x5437, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) 03:33:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCEXCL(r1, 0x540c) ioctl$TCFLSH(r1, 0x5437, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) 03:33:20 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x18, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 03:33:20 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='gU'], 0x2) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:33:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCEXCL(r1, 0x540c) ioctl$TCFLSH(r1, 0x5437, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) 03:33:20 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) clone(0x0, &(0x7f00000006c0)="b37ba5600b66630f060500000000000000d039bcdbba07e04ad3ba9eda42abb251576f5fa8ff67cc6018900fe94ca49b7785d80c929ce91c988f2f8c4fbf836f89f48e9fbe6bc93e2c9ecd24896a5382ade2de04831776b454806248f1bbef17646123168d63bbf1fbb8278930d46e55ec20e32ec80f22d6001b0aee00c28eb80b9caf90b0637c09e6a66728fb0b6d7fc5", &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) 03:33:20 executing program 2: futex(&(0x7f0000000040), 0xc, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000001540)='IPVS\x00', 0xffffffffffffff9c}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) clock_gettime(0x0, &(0x7f0000001580)) pipe(&(0x7f0000000180)) getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001680)={{{@in=@remote, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000001780)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:20 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) semop(0x0, &(0x7f0000000040)=[{}, {}], 0xf4) 03:33:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCEXCL(r1, 0x540c) ioctl$TCFLSH(r1, 0x5437, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) 03:33:20 executing program 5: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 03:33:20 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='gU'], 0x2) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:33:20 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000100)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f0000000180)=0x80, 0x4) bind$xdp(r3, &(0x7f0000000300)={0x2c, 0x0, r2}, 0x10) close(r3) 03:33:20 executing program 4: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000002c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) fdatasync(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}}) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f000031e000), 0x1c) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) [ 396.861967] sctp: [Deprecated]: syz-executor5 (pid 12228) Use of struct sctp_assoc_value in delayed_ack socket option. [ 396.861967] Use struct sctp_sack_info instead 03:33:20 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r2 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20013, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) setpriority(0x0, 0x0, 0xfffffffffffffffa) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000003fe8)=[@register_looper], 0x0, 0x0, &(0x7f0000009000)}) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f00000000c0)={0x3, 0x5}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0xfffffffffffffd27, 0x0, &(0x7f0000002000)}) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000000140)) r4 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000180)) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) 03:33:22 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000100)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f0000000180)=0x80, 0x4) bind$xdp(r3, &(0x7f0000000300)={0x2c, 0x0, r2}, 0x10) close(r3) 03:33:22 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='gU'], 0x2) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:33:22 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) clone(0x0, &(0x7f00000006c0)="b37ba5600b66630f060500000000000000d039bcdbba07e04ad3ba9eda42abb251576f5fa8ff67cc6018900fe94ca49b7785d80c929ce91c988f2f8c4fbf836f89f48e9fbe6bc93e2c9ecd24896a5382ade2de04831776b454806248f1bbef17646123168d63bbf1fbb8278930d46e55ec20e32ec80f22d6001b0aee00c28eb80b9caf90b0637c09e6a66728fb0b6d7fc5", &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) [ 399.486909] attempt to access beyond end of device [ 399.492093] loop3: rw=1, want=33905, limit=112 03:33:23 executing program 2: rt_sigpending(&(0x7f0000000680), 0x1b3) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000280)='./file0\x00'}, 0x35a) semget$private(0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000900), &(0x7f00000009c0)=0x98) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000a00), &(0x7f0000000a40)=0x10) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") getpeername$netlink(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:33:23 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r2 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20013, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) setpriority(0x0, 0x0, 0xfffffffffffffffa) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000003fe8)=[@register_looper], 0x0, 0x0, &(0x7f0000009000)}) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f00000000c0)={0x3, 0x5}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0xfffffffffffffd27, 0x0, &(0x7f0000002000)}) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000000140)) r4 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000180)) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) 03:33:23 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000100)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f0000000180)=0x80, 0x4) bind$xdp(r3, &(0x7f0000000300)={0x2c, 0x0, r2}, 0x10) close(r3) 03:33:23 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r2 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20013, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) setpriority(0x0, 0x0, 0xfffffffffffffffa) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000003fe8)=[@register_looper], 0x0, 0x0, &(0x7f0000009000)}) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f00000000c0)={0x3, 0x5}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0xfffffffffffffd27, 0x0, &(0x7f0000002000)}) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000000140)) r4 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000180)) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) 03:33:23 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r2 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20013, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) setpriority(0x0, 0x0, 0xfffffffffffffffa) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000003fe8)=[@register_looper], 0x0, 0x0, &(0x7f0000009000)}) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f00000000c0)={0x3, 0x5}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0xfffffffffffffd27, 0x0, &(0x7f0000002000)}) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000000140)) r4 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000180)) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) 03:33:23 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000100)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f0000000180)=0x80, 0x4) bind$xdp(r3, &(0x7f0000000300)={0x2c, 0x0, r2}, 0x10) close(r3) [ 400.053755] audit: type=1326 audit(2000000003.500:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12258 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:33:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$KVM_SET_CPUID(r1, 0x8108551b, &(0x7f0000000080)) 03:33:23 executing program 4: clock_gettime(0x5, &(0x7f0000000540)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000640)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) accept(0xffffffffffffffff, &(0x7f0000000140)=@ll, &(0x7f0000000240)=0x80) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) memfd_create(&(0x7f0000000100)='broute\x00', 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000580)={'broute\x00', 0x0, 0x0, 0x84, [], 0x0, &(0x7f0000000380), &(0x7f0000000440)=""/132}, &(0x7f0000000500)=0x78) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000200), 0x8) sendmmsg(0xffffffffffffffff, &(0x7f0000004f80), 0x0, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000600)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000680)="42805da0120fef69dc0f01eece73fe67f0f75efbfa0f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000880), 0x4) accept(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 03:33:23 executing program 5: pipe(&(0x7f0000000480)) getpgrp(0xffffffffffffffff) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000900)=0xc) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000940)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000a40)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in=@multicast1, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000bc0)=0xe8) lstat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() getegid() getpid() lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) getresgid(&(0x7f0000001240), &(0x7f0000001280), &(0x7f00000012c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000014c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@ipv4={[], [], @dev}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000001600)=0xe8) stat(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004d00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000004e00)=0xe8) getresgid(&(0x7f0000004e40), &(0x7f0000004e80), &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004f40)={{{@in6=@loopback, @in6=@loopback}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000005040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005080), &(0x7f00000050c0)=0xc) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005280)={{{@in=@dev, @in=@rand_addr}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000005380)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000053c0), &(0x7f0000005400)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005440)) fstat(0xffffffffffffffff, &(0x7f0000005480)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005500), &(0x7f0000005540)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005580)) lstat(&(0x7f0000005600)='./file0/file0\x00', &(0x7f0000005640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007b40)) geteuid() getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$KVM_SET_CPUID(r1, 0x8108551b, &(0x7f0000000080)) 03:33:23 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@gettfilter={0x24}, 0x24}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:24 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) clone(0x0, &(0x7f00000006c0)="b37ba5600b66630f060500000000000000d039bcdbba07e04ad3ba9eda42abb251576f5fa8ff67cc6018900fe94ca49b7785d80c929ce91c988f2f8c4fbf836f89f48e9fbe6bc93e2c9ecd24896a5382ade2de04831776b454806248f1bbef17646123168d63bbf1fbb8278930d46e55ec20e32ec80f22d6001b0aee00c28eb80b9caf90b0637c09e6a66728fb0b6d7fc5", &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) 03:33:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$KVM_SET_CPUID(r1, 0x8108551b, &(0x7f0000000080)) 03:33:24 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffd) futex(&(0x7f0000000ac0), 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000540)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/ppp\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000bc0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000c00)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) getresuid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000a00)={0x90}, 0x90) setresgid(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) syz_open_dev$sndpcmc(&(0x7f0000000640)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000600)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540), &(0x7f0000000580)=0x4) getgid() setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000007c0)={'filter\x00', 0x4}, 0x68) 03:33:24 executing program 0: socket$inet6_dccp(0xa, 0x6, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$setname(0x18, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) syz_execute_func(&(0x7f0000000340)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$KVM_SET_CPUID(r1, 0x8108551b, &(0x7f0000000080)) [ 400.845727] attempt to access beyond end of device [ 400.850715] loop3: rw=1, want=130, limit=112 [ 400.893867] Buffer I/O error on dev loop3, logical block 129, lost async page write [ 400.932132] attempt to access beyond end of device 03:33:24 executing program 1: socket$can_bcm(0x1d, 0x2, 0x2) vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) socket$inet(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) [ 400.948808] loop3: rw=1, want=131, limit=112 [ 400.966417] Buffer I/O error on dev loop3, logical block 130, lost async page write 03:33:24 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) [ 401.015537] attempt to access beyond end of device [ 401.039874] loop3: rw=1, want=132, limit=112 [ 401.057531] Buffer I/O error on dev loop3, logical block 131, lost async page write [ 401.080992] attempt to access beyond end of device [ 401.096270] loop3: rw=1, want=133, limit=112 [ 401.109996] Buffer I/O error on dev loop3, logical block 132, lost async page write [ 401.131559] attempt to access beyond end of device [ 401.148823] loop3: rw=1, want=142, limit=112 [ 401.163666] Buffer I/O error on dev loop3, logical block 141, lost async page write [ 401.187379] attempt to access beyond end of device [ 401.203994] loop3: rw=1, want=143, limit=112 [ 401.218218] Buffer I/O error on dev loop3, logical block 142, lost async page write [ 401.242325] attempt to access beyond end of device [ 401.258926] loop3: rw=1, want=144, limit=112 [ 401.275037] Buffer I/O error on dev loop3, logical block 143, lost async page write 03:33:24 executing program 5: clock_gettime(0x7fffffffffffffc, &(0x7f0000000440)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000080), &(0x7f00000002c0)=0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 401.318071] attempt to access beyond end of device [ 401.337720] loop3: rw=1, want=145, limit=112 [ 401.342182] Buffer I/O error on dev loop3, logical block 144, lost async page write [ 401.400720] attempt to access beyond end of device [ 401.415382] loop3: rw=1, want=4241, limit=112 [ 401.440334] attempt to access beyond end of device 03:33:24 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000001140)='/dev/input/event#\x00', 0x0, 0x28001) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r1, 0x401000) r2 = socket$inet6(0xa, 0x6, 0x0) ioctl$FICLONE(r1, 0x40049409, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000002c0)={@dev={0xfe, 0x80, [], 0xf}, 0x67, r5}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r4, 0x29, 0x2, &(0x7f0000000040)=0x1f, 0x4) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x40, 0x0) syz_open_procfs(r3, &(0x7f0000000400)='net/snmp\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xf, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x100000001}, [@map={0x18, 0x1, 0x1, 0x0, r6}, @generic={0x3, 0x3, 0x2, 0x9}, @jmp={0x5, 0x1, 0xb, 0xa, 0xa, 0xfffffffffffffff8, 0x18}, @generic={0x7fffffff, 0x8, 0x6, 0x9a9}, @generic={0x8000, 0x3, 0x1}, @jmp={0x5, 0x4, 0x6, 0x8, 0x3, 0xfffffffffffffff8, 0xfffffffffffffff4}]}, &(0x7f0000000140)='GPL\x00', 0x8000, 0x50, &(0x7f0000000300)=""/80, 0x41100, 0x1, [], r5, 0xf}, 0x48) sendmmsg(r4, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x18000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$evdev(r0, &(0x7f0000000040)=[{}], 0x18) write$P9_RREADLINK(r6, &(0x7f0000000440)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$sock_bt_bnep_BNEPCONNADD(r6, 0x400442c8, &(0x7f0000000480)=ANY=[@ANYBLOB="910000000000ba9910e5c81a2f81a743920ef00c16f7b02febd2cb03852670baff03e6b9391ec2e809f52989a18a32ac7a000000000000000000964f7986944047193e3f8b266e195d6395a4040bf665d6414f3d8a87a90cd0d0"]) [ 401.461503] loop3: rw=1, want=7961, limit=112 [ 401.481406] attempt to access beyond end of device [ 401.513131] loop3: rw=1, want=7990, limit=112 [ 401.517708] Buffer I/O error on dev loop3, logical block 7989, lost async page write [ 401.549497] attempt to access beyond end of device [ 401.564483] loop3: rw=1, want=7991, limit=112 [ 401.589366] Buffer I/O error on dev loop3, logical block 7990, lost async page write [ 401.620062] attempt to access beyond end of device [ 401.630938] loop3: rw=1, want=7992, limit=112 03:33:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x101240, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") [ 401.644119] attempt to access beyond end of device [ 401.655498] loop3: rw=1, want=7993, limit=112 [ 401.665983] attempt to access beyond end of device [ 401.677210] loop3: rw=1, want=8014, limit=112 [ 401.697770] attempt to access beyond end of device [ 401.725994] loop3: rw=1, want=8015, limit=112 [ 401.744130] attempt to access beyond end of device [ 401.764125] loop3: rw=1, want=8016, limit=112 [ 401.793370] attempt to access beyond end of device [ 401.834640] loop3: rw=1, want=8017, limit=112 [ 401.873369] attempt to access beyond end of device [ 401.911477] loop3: rw=1, want=8066, limit=112 [ 401.940863] attempt to access beyond end of device 03:33:25 executing program 1: socket$can_bcm(0x1d, 0x2, 0x2) vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) socket$inet(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) [ 401.971839] loop3: rw=1, want=8067, limit=112 [ 401.991370] attempt to access beyond end of device [ 402.020457] loop3: rw=1, want=8068, limit=112 [ 402.045750] attempt to access beyond end of device [ 402.067891] loop3: rw=1, want=8069, limit=112 03:33:25 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000600)=@newlink={0x40, 0x10, 0x3eb80125379cfe6d, 0x0, 0x0, {}, [@IFLA_NUM_RX_QUEUES={0x8, 0xc01f}, @IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x40}}, 0x0) [ 402.095739] attempt to access beyond end of device [ 402.100794] loop3: rw=1, want=8078, limit=112 [ 402.105717] attempt to access beyond end of device [ 402.122112] loop3: rw=1, want=8079, limit=112 [ 402.144301] attempt to access beyond end of device [ 402.152747] loop3: rw=1, want=8080, limit=112 [ 402.160955] attempt to access beyond end of device [ 402.170703] loop3: rw=1, want=8081, limit=112 [ 402.205646] alloc_netdev: Unable to allocate device with zero queues [ 402.218466] attempt to access beyond end of device [ 402.253507] loop3: rw=1, want=12177, limit=112 [ 402.287892] attempt to access beyond end of device [ 402.292880] loop3: rw=1, want=16273, limit=112 [ 402.359547] attempt to access beyond end of device [ 402.364809] loop3: rw=1, want=20369, limit=112 [ 402.394071] attempt to access beyond end of device [ 402.399068] loop3: rw=1, want=24465, limit=112 [ 402.437149] attempt to access beyond end of device [ 402.442151] loop3: rw=1, want=28561, limit=112 [ 402.455696] attempt to access beyond end of device [ 402.460637] loop3: rw=1, want=32657, limit=112 03:33:26 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) clone(0x0, &(0x7f00000006c0)="b37ba5600b66630f060500000000000000d039bcdbba07e04ad3ba9eda42abb251576f5fa8ff67cc6018900fe94ca49b7785d80c929ce91c988f2f8c4fbf836f89f48e9fbe6bc93e2c9ecd24896a5382ade2de04831776b454806248f1bbef17646123168d63bbf1fbb8278930d46e55ec20e32ec80f22d6001b0aee00c28eb80b9caf90b0637c09e6a66728fb0b6d7fc5", &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) 03:33:26 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000640)=0xc) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000b00)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@ipv4={[], [], @dev}, @in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000025c0), &(0x7f0000002600)=0xc) getgroups(0x0, &(0x7f0000002640)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002680)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000026c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@loopback}}}, &(0x7f00000027c0)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002800)) fstat(0xffffffffffffffff, &(0x7f0000002840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002940)) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) fstat(0xffffffffffffffff, &(0x7f0000002a40)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002bc0)={&(0x7f00000001c0), 0xc, &(0x7f0000000d40), 0x0, &(0x7f0000002ac0)}, 0x0) mknod(&(0x7f00007f2ff8)='./file0\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000380)) sendmmsg(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) open(&(0x7f00007ddff8)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880), 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0), &(0x7f0000000840)=0x4) ioctl$KDGKBLED(0xffffffffffffffff, 0xc0189436, &(0x7f0000000fff)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0x9) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002d80)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000680)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getegid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) 03:33:26 executing program 5: keyctl$set_reqkey_keyring(0x10, 0x7) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002b80)=0x14) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00'}, 0x10) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@multicast2, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)={@local, @broadcast}, &(0x7f0000000440)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000002400), 0x0, 0x0, &(0x7f0000002540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002580)={{{@in=@remote, @in6=@remote}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000026c0)={{{@in=@remote, @in=@broadcast}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000027c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002840)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002880)={'ip6gre0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000028c0)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f00000029c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a00)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000002b00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002b40)={'team0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000002bc0)=@hci, &(0x7f0000002c40)=0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002c80)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000002d80)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f0000000180), 0xc, &(0x7f0000003340)={&(0x7f0000002dc0)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) 03:33:26 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000001140)='/dev/input/event#\x00', 0x0, 0x28001) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r1, 0x401000) r2 = socket$inet6(0xa, 0x6, 0x0) ioctl$FICLONE(r1, 0x40049409, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000002c0)={@dev={0xfe, 0x80, [], 0xf}, 0x67, r5}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r4, 0x29, 0x2, &(0x7f0000000040)=0x1f, 0x4) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x40, 0x0) syz_open_procfs(r3, &(0x7f0000000400)='net/snmp\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xf, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x100000001}, [@map={0x18, 0x1, 0x1, 0x0, r6}, @generic={0x3, 0x3, 0x2, 0x9}, @jmp={0x5, 0x1, 0xb, 0xa, 0xa, 0xfffffffffffffff8, 0x18}, @generic={0x7fffffff, 0x8, 0x6, 0x9a9}, @generic={0x8000, 0x3, 0x1}, @jmp={0x5, 0x4, 0x6, 0x8, 0x3, 0xfffffffffffffff8, 0xfffffffffffffff4}]}, &(0x7f0000000140)='GPL\x00', 0x8000, 0x50, &(0x7f0000000300)=""/80, 0x41100, 0x1, [], r5, 0xf}, 0x48) sendmmsg(r4, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x18000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$evdev(r0, &(0x7f0000000040)=[{}], 0x18) write$P9_RREADLINK(r6, &(0x7f0000000440)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$sock_bt_bnep_BNEPCONNADD(r6, 0x400442c8, &(0x7f0000000480)=ANY=[@ANYBLOB="910000000000ba9910e5c81a2f81a743920ef00c16f7b02febd2cb03852670baff03e6b9391ec2e809f52989a18a32ac7a000000000000000000964f7986944047193e3f8b266e195d6395a4040bf665d6414f3d8a87a90cd0d0"]) 03:33:26 executing program 2: keyctl$set_reqkey_keyring(0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000300)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x7530}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) arch_prctl(0x0, &(0x7f0000000480)) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000440)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:26 executing program 1: socket$can_bcm(0x1d, 0x2, 0x2) vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) socket$inet(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) [ 403.589327] attempt to access beyond end of device [ 403.599695] loop3: rw=1, want=114, limit=112 [ 403.644247] attempt to access beyond end of device [ 403.684450] loop3: rw=1, want=115, limit=112 [ 403.699780] attempt to access beyond end of device [ 403.723121] loop3: rw=1, want=116, limit=112 [ 403.741509] attempt to access beyond end of device [ 403.772870] loop3: rw=1, want=117, limit=112 [ 403.806801] attempt to access beyond end of device [ 403.843205] loop3: rw=1, want=130, limit=112 [ 403.874346] attempt to access beyond end of device [ 403.906741] loop3: rw=1, want=131, limit=112 [ 403.936240] attempt to access beyond end of device [ 403.966678] loop3: rw=1, want=132, limit=112 [ 403.995269] attempt to access beyond end of device [ 404.024142] loop3: rw=1, want=133, limit=112 [ 404.059057] attempt to access beyond end of device [ 404.064293] loop3: rw=1, want=4237, limit=112 [ 404.072767] attempt to access beyond end of device [ 404.078478] loop3: rw=1, want=4245, limit=112 [ 404.083612] attempt to access beyond end of device [ 404.088723] loop3: rw=1, want=4246, limit=112 [ 404.093887] attempt to access beyond end of device [ 404.099030] loop3: rw=1, want=4247, limit=112 [ 404.131009] attempt to access beyond end of device [ 404.150730] loop3: rw=1, want=4248, limit=112 [ 404.168966] attempt to access beyond end of device [ 404.190153] loop3: rw=1, want=4249, limit=112 [ 404.195516] attempt to access beyond end of device [ 404.200674] loop3: rw=1, want=4278, limit=112 [ 404.205897] attempt to access beyond end of device [ 404.211295] loop3: rw=1, want=4279, limit=112 [ 404.216544] attempt to access beyond end of device [ 404.221720] loop3: rw=1, want=4280, limit=112 [ 404.231559] attempt to access beyond end of device [ 404.237105] loop3: rw=1, want=4281, limit=112 [ 404.241882] attempt to access beyond end of device [ 404.247508] loop3: rw=1, want=4302, limit=112 [ 404.252221] attempt to access beyond end of device [ 404.265049] loop3: rw=1, want=4303, limit=112 [ 404.269649] attempt to access beyond end of device [ 404.286056] loop3: rw=1, want=4304, limit=112 03:33:27 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000001140)='/dev/input/event#\x00', 0x0, 0x28001) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r1, 0x401000) r2 = socket$inet6(0xa, 0x6, 0x0) ioctl$FICLONE(r1, 0x40049409, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000002c0)={@dev={0xfe, 0x80, [], 0xf}, 0x67, r5}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r4, 0x29, 0x2, &(0x7f0000000040)=0x1f, 0x4) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x40, 0x0) syz_open_procfs(r3, &(0x7f0000000400)='net/snmp\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xf, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x100000001}, [@map={0x18, 0x1, 0x1, 0x0, r6}, @generic={0x3, 0x3, 0x2, 0x9}, @jmp={0x5, 0x1, 0xb, 0xa, 0xa, 0xfffffffffffffff8, 0x18}, @generic={0x7fffffff, 0x8, 0x6, 0x9a9}, @generic={0x8000, 0x3, 0x1}, @jmp={0x5, 0x4, 0x6, 0x8, 0x3, 0xfffffffffffffff8, 0xfffffffffffffff4}]}, &(0x7f0000000140)='GPL\x00', 0x8000, 0x50, &(0x7f0000000300)=""/80, 0x41100, 0x1, [], r5, 0xf}, 0x48) sendmmsg(r4, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x18000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$evdev(r0, &(0x7f0000000040)=[{}], 0x18) write$P9_RREADLINK(r6, &(0x7f0000000440)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$sock_bt_bnep_BNEPCONNADD(r6, 0x400442c8, &(0x7f0000000480)=ANY=[@ANYBLOB="910000000000ba9910e5c81a2f81a743920ef00c16f7b02febd2cb03852670baff03e6b9391ec2e809f52989a18a32ac7a000000000000000000964f7986944047193e3f8b266e195d6395a4040bf665d6414f3d8a87a90cd0d0"]) [ 404.290717] attempt to access beyond end of device [ 404.308705] loop3: rw=1, want=4305, limit=112 [ 404.339834] attempt to access beyond end of device [ 404.350355] loop3: rw=1, want=4338, limit=112 [ 404.368762] attempt to access beyond end of device [ 404.381776] loop3: rw=1, want=4339, limit=112 03:33:27 executing program 1: socket$can_bcm(0x1d, 0x2, 0x2) vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) socket$inet(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) [ 404.403279] attempt to access beyond end of device [ 404.408322] loop3: rw=1, want=4340, limit=112 [ 404.412853] attempt to access beyond end of device [ 404.434006] loop3: rw=1, want=4341, limit=112 [ 404.457581] attempt to access beyond end of device [ 404.462611] loop3: rw=1, want=4354, limit=112 03:33:28 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)='F', 0x1, 0x40, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) [ 404.513241] attempt to access beyond end of device [ 404.533428] loop3: rw=1, want=4355, limit=112 [ 404.538177] attempt to access beyond end of device [ 404.569598] loop3: rw=1, want=4356, limit=112 [ 404.585795] attempt to access beyond end of device [ 404.590817] loop3: rw=1, want=4357, limit=112 03:33:28 executing program 5: setrlimit(0x0, &(0x7f0000000200)) eventfd(0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) accept4(0xffffffffffffffff, &(0x7f0000000280)=@generic, &(0x7f00000000c0)=0x80, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 404.620615] attempt to access beyond end of device [ 404.633843] loop3: rw=1, want=4366, limit=112 [ 404.638460] attempt to access beyond end of device [ 404.659274] loop3: rw=1, want=4367, limit=112 [ 404.683182] attempt to access beyond end of device [ 404.688212] loop3: rw=1, want=4368, limit=112 [ 404.692743] attempt to access beyond end of device 03:33:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000200)={@remote, 0x4}, 0x20) [ 404.726076] loop3: rw=1, want=4369, limit=112 [ 404.760362] attempt to access beyond end of device [ 404.801380] loop3: rw=1, want=8465, limit=112 [ 404.851697] attempt to access beyond end of device [ 404.898428] loop3: rw=1, want=12561, limit=112 03:33:28 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000013000)) close(r1) syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) close(r0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 404.931752] attempt to access beyond end of device [ 404.982817] loop3: rw=1, want=16657, limit=112 [ 405.012475] attempt to access beyond end of device [ 405.020956] loop3: rw=1, want=20753, limit=112 [ 405.046377] attempt to access beyond end of device [ 405.055973] loop3: rw=1, want=24849, limit=112 [ 405.091046] attempt to access beyond end of device [ 405.123153] loop3: rw=1, want=28945, limit=112 [ 405.155454] attempt to access beyond end of device [ 405.160434] loop3: rw=1, want=32985, limit=112 03:33:29 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000001140)='/dev/input/event#\x00', 0x0, 0x28001) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) listen(r1, 0x401000) r2 = socket$inet6(0xa, 0x6, 0x0) ioctl$FICLONE(r1, 0x40049409, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000002c0)={@dev={0xfe, 0x80, [], 0xf}, 0x67, r5}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r4, 0x29, 0x2, &(0x7f0000000040)=0x1f, 0x4) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x40, 0x0) syz_open_procfs(r3, &(0x7f0000000400)='net/snmp\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xf, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x100000001}, [@map={0x18, 0x1, 0x1, 0x0, r6}, @generic={0x3, 0x3, 0x2, 0x9}, @jmp={0x5, 0x1, 0xb, 0xa, 0xa, 0xfffffffffffffff8, 0x18}, @generic={0x7fffffff, 0x8, 0x6, 0x9a9}, @generic={0x8000, 0x3, 0x1}, @jmp={0x5, 0x4, 0x6, 0x8, 0x3, 0xfffffffffffffff8, 0xfffffffffffffff4}]}, &(0x7f0000000140)='GPL\x00', 0x8000, 0x50, &(0x7f0000000300)=""/80, 0x41100, 0x1, [], r5, 0xf}, 0x48) sendmmsg(r4, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x18000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$evdev(r0, &(0x7f0000000040)=[{}], 0x18) write$P9_RREADLINK(r6, &(0x7f0000000440)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$sock_bt_bnep_BNEPCONNADD(r6, 0x400442c8, &(0x7f0000000480)=ANY=[@ANYBLOB="910000000000ba9910e5c81a2f81a743920ef00c16f7b02febd2cb03852670baff03e6b9391ec2e809f52989a18a32ac7a000000000000000000964f7986944047193e3f8b266e195d6395a4040bf665d6414f3d8a87a90cd0d0"]) 03:33:29 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2, &(0x7f00000001c0)="107d5298871577744016c909580d5d2e5c49a965c622a58fcbd65e9da28ac5a266b98ad96f7d94220c7244d869cd603f06344ea9adcb96f3071998c69e39767e2f7474750230c5b1e1681a0eb48f88ea423628a5b52d758fcc57d18dba3edbdf9cef03de37749863a46b4b74748603e9771854c7b9e367ca65027eb8d28bfdc7d9686ee41c89ede6ac3d6beea64f6d") sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000280)) unshare(0x6c000000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) pipe2(&(0x7f0000000140), 0x0) clock_gettime(0x8000000000, &(0x7f0000000340)) socket$packet(0x11, 0x0, 0x300) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100}) 03:33:29 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000200)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getresuid(&(0x7f00000003c0), &(0x7f0000000640), &(0x7f0000000680)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002880), &(0x7f00000028c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getresgid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) lstat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xfffffffffffffeab) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000003300)=0xe8) getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003400)) stat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) getgroups(0x0, &(0x7f0000003500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003540), &(0x7f0000003580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000035c0)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f00000036c0)=0xe8) getresgid(&(0x7f0000003700), &(0x7f0000003740), &(0x7f0000003780)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:29 executing program 1: memfd_create(&(0x7f0000000080)='proc\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) sigaltstack(&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000200)) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc336397c2a0f0fcdae300f2b38f63cf63ca5e0400f01ef670f2c73007f0c813981391a1a01460f01ee45dfde9f") socket$unix(0x1, 0x0, 0x0) 03:33:29 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x6c3, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) [ 406.294840] attempt to access beyond end of device [ 406.299826] loop3: rw=1, want=130, limit=112 [ 406.319231] buffer_io_error: 46 callbacks suppressed [ 406.319242] Buffer I/O error on dev loop3, logical block 129, lost async page write [ 406.405070] IPVS: ftp: loaded support on port[0] = 21 [ 406.420129] attempt to access beyond end of device [ 406.438480] loop3: rw=1, want=131, limit=112 [ 406.459201] Buffer I/O error on dev loop3, logical block 130, lost async page write [ 406.499231] attempt to access beyond end of device [ 406.524482] loop3: rw=1, want=132, limit=112 [ 406.549988] Buffer I/O error on dev loop3, logical block 131, lost async page write [ 406.550129] attempt to access beyond end of device [ 406.632520] loop3: rw=1, want=133, limit=112 [ 406.674688] Buffer I/O error on dev loop3, logical block 132, lost async page write [ 406.744973] attempt to access beyond end of device [ 406.750004] loop3: rw=1, want=142, limit=112 [ 406.750031] Buffer I/O error on dev loop3, logical block 141, lost async page write [ 406.750065] attempt to access beyond end of device [ 406.803161] loop3: rw=1, want=143, limit=112 [ 406.812356] Buffer I/O error on dev loop3, logical block 142, lost async page write [ 406.840083] attempt to access beyond end of device 03:33:30 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2, &(0x7f00000001c0)="107d5298871577744016c909580d5d2e5c49a965c622a58fcbd65e9da28ac5a266b98ad96f7d94220c7244d869cd603f06344ea9adcb96f3071998c69e39767e2f7474750230c5b1e1681a0eb48f88ea423628a5b52d758fcc57d18dba3edbdf9cef03de37749863a46b4b74748603e9771854c7b9e367ca65027eb8d28bfdc7d9686ee41c89ede6ac3d6beea64f6d") sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000280)) unshare(0x6c000000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) pipe2(&(0x7f0000000140), 0x0) clock_gettime(0x8000000000, &(0x7f0000000340)) socket$packet(0x11, 0x0, 0x300) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100}) [ 406.856613] loop3: rw=1, want=144, limit=112 [ 406.870470] Buffer I/O error on dev loop3, logical block 143, lost async page write [ 406.909690] attempt to access beyond end of device [ 406.918680] loop3: rw=1, want=145, limit=112 [ 406.928082] Buffer I/O error on dev loop3, logical block 144, lost async page write [ 406.948118] kasan: CONFIG_KASAN_INLINE enabled [ 406.953848] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 406.961382] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 406.967640] CPU: 0 PID: 12426 Comm: syz-executor2 Not tainted 4.19.0-rc3-next-20180912+ #72 [ 406.970821] attempt to access beyond end of device [ 406.976129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.976158] RIP: 0010:mqueue_get_tree+0xba/0x2e0 [ 406.976177] Code: 4c 8d b3 98 00 00 00 4d 85 ed 0f 84 d1 00 00 00 e8 6b 44 3f fe 49 8d 7d 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 e3 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 406.976192] RSP: 0018:ffff88016362f928 EFLAGS: 00010a02 [ 406.985748] loop3: rw=1, want=3737, limit=112 [ 406.990468] RAX: dffffc0000000000 RBX: ffff8801c18cb640 RCX: ffffc9000345b000 [ 406.990477] RDX: 10000048200002b9 RSI: ffffffff833deb15 RDI: 80000241000015c8 [ 406.990487] RBP: ffff88016362f948 R08: fffffbfff13555fd R09: fffffbfff13555fc [ 406.990496] R10: fffffbfff13555fc R11: ffffffff89aaafe3 R12: ffff8801c8f40680 [ 406.990506] R13: 80000241000015c0 R14: ffff8801c18cb6d8 R15: ffff8801c18cb6d8 [ 406.990525] FS: 00007f7a10764700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 407.006070] attempt to access beyond end of device [ 407.014168] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 407.014177] CR2: 0000001b30e23000 CR3: 00000001d94f6000 CR4: 00000000001406f0 [ 407.014198] Call Trace: [ 407.014223] vfs_get_tree+0x1cb/0x5c0 [ 407.014243] mq_create_mount+0xe3/0x190 [ 407.014264] mq_init_ns+0x15a/0x210 [ 407.027500] loop3: rw=1, want=3766, limit=112 [ 407.031486] copy_ipcs+0x3d2/0x580 [ 407.031501] ? ipcns_get+0xe0/0xe0 [ 407.031526] ? do_mount+0x1db0/0x1db0 [ 407.031545] ? kmem_cache_alloc+0x33a/0x730 [ 407.047673] Buffer I/O error on dev loop3, logical block 3765, lost async page write [ 407.053329] ? rcu_softirq_qs+0x20/0x20 [ 407.053351] create_new_namespaces+0x376/0x900 [ 407.053371] ? sys_ni_syscall+0x20/0x20 [ 407.053391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 407.053411] ? ns_capable_common+0x13f/0x170 [ 407.065352] attempt to access beyond end of device [ 407.068919] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 407.068939] ksys_unshare+0x79c/0x10b0 [ 407.068956] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 407.068975] ? walk_process_tree+0x440/0x440 [ 407.174114] ? __fget_light+0x2e9/0x430 [ 407.178094] ? fget_raw+0x20/0x20 [ 407.181551] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 407.186482] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 407.191763] ? __x64_sys_futex+0x47f/0x6a0 [ 407.195998] ? do_syscall_64+0x9a/0x820 [ 407.199981] ? do_syscall_64+0x9a/0x820 [ 407.203958] ? lockdep_hardirqs_on+0x421/0x5c0 [ 407.208545] ? trace_hardirqs_on+0xbd/0x310 [ 407.212870] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 407.218415] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.223781] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 407.229230] ? ksys_ioctl+0x81/0xd0 [ 407.232869] __x64_sys_unshare+0x31/0x40 [ 407.236934] do_syscall_64+0x1b9/0x820 [ 407.240820] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 407.246185] ? syscall_return_slowpath+0x5e0/0x5e0 [ 407.251111] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 407.255954] ? trace_hardirqs_on_caller+0x310/0x310 [ 407.260967] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 407.265984] ? prepare_exit_to_usermode+0x291/0x3b0 [ 407.271003] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 407.275853] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.281040] RIP: 0033:0x4572d9 [ 407.284232] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 407.303134] RSP: 002b:00007f7a10763c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 407.310842] RAX: ffffffffffffffda RBX: 00007f7a107646d4 RCX: 00000000004572d9 [ 407.318288] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c000000 [ 407.325558] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 407.332820] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 407.340085] R13: 00000000004d7c40 R14: 00000000004caa82 R15: 0000000000000000 [ 407.347358] Modules linked in: [ 407.351383] ---[ end trace 93d05fa944ad2895 ]--- [ 407.356367] RIP: 0010:mqueue_get_tree+0xba/0x2e0 [ 407.361229] Code: 4c 8d b3 98 00 00 00 4d 85 ed 0f 84 d1 00 00 00 e8 6b 44 3f fe 49 8d 7d 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 e3 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 407.380363] RSP: 0018:ffff88016362f928 EFLAGS: 00010a02 [ 407.385954] RAX: dffffc0000000000 RBX: ffff8801c18cb640 RCX: ffffc9000345b000 [ 407.386225] loop3: rw=1, want=3767, limit=112 [ 407.393342] RDX: 10000048200002b9 RSI: ffffffff833deb15 RDI: 80000241000015c8 [ 407.393380] RBP: ffff88016362f948 R08: fffffbfff13555fd R09: fffffbfff13555fc [ 407.393441] R10: fffffbfff13555fc R11: ffffffff89aaafe3 R12: ffff8801c8f40680 [ 407.419983] R13: 80000241000015c0 R14: ffff8801c18cb6d8 R15: ffff8801c18cb6d8 [ 407.424048] kobject: 'loop4' (00000000c3c0a7a3): kobject_uevent_env [ 407.427379] FS: 00007f7a10764700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 407.436453] Buffer I/O error on dev loop3, logical block 3766, lost async page write [ 407.442055] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 407.450509] kobject: 'loop4' (00000000c3c0a7a3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 407.455863] CR2: 0000001b30e23000 CR3: 00000001d94f6000 CR4: 00000000001406f0 [ 407.466611] attempt to access beyond end of device [ 407.472682] Kernel panic - not syncing: Fatal exception [ 407.483808] Kernel Offset: disabled [ 407.487429] Rebooting in 86400 seconds..