000100)) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000000280)) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000b40)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932cbc2ebc0d64ac1e5d9f7f") 19:24:45 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:24:45 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:24:45 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:24:45 executing program 2: sysinfo(&(0x7f00000001c0)=""/145) getpgid(0xffffffffffffffff) syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@rand_addr, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000b00), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) fchdir(0xffffffffffffffff) getpgid(0x0) getpgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000b80)={0x0, &(0x7f0000000b40)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000000280)) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000b40)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932cbc2ebc0d64ac1e5d9f7f") 19:24:46 executing program 2: sysinfo(&(0x7f00000001c0)=""/145) getpgid(0xffffffffffffffff) syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@rand_addr, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000b00), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) fchdir(0xffffffffffffffff) getpgid(0x0) getpgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000b80)={0x0, &(0x7f0000000b40)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000000280)) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000b40)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932cbc2ebc0d64ac1e5d9f7f") 19:24:46 executing program 2: sysinfo(&(0x7f00000001c0)=""/145) getpgid(0xffffffffffffffff) syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@rand_addr, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000b00), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) fchdir(0xffffffffffffffff) getpgid(0x0) getpgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000b80)={0x0, &(0x7f0000000b40)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000000280)) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000b40)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932cbc2ebc0d64ac1e5d9f7f") 19:24:46 executing program 2: sysinfo(&(0x7f00000001c0)=""/145) getpgid(0xffffffffffffffff) syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@rand_addr, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000b00), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) fchdir(0xffffffffffffffff) getpgid(0x0) getpgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000b80)={0x0, &(0x7f0000000b40)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000000280)) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000b40)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932cbc2ebc0d64ac1e5d9f7f") 19:24:46 executing program 2: sysinfo(&(0x7f00000001c0)=""/145) getpgid(0xffffffffffffffff) syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@rand_addr, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000b00), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) fchdir(0xffffffffffffffff) getpgid(0x0) getpgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000b80)={0x0, &(0x7f0000000b40)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000000280)) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000b40)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932cbc2ebc0d64ac1e5d9f7f") 19:24:46 executing program 2: sysinfo(&(0x7f00000001c0)=""/145) getpgid(0xffffffffffffffff) syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@rand_addr, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000b00), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) fchdir(0xffffffffffffffff) getpgid(0x0) getpgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000b80)={0x0, &(0x7f0000000b40)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000000280)) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000b40)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932cbc2ebc0d64ac1e5d9f7f") 19:24:46 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:24:46 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:24:46 executing program 2: sysinfo(&(0x7f00000001c0)=""/145) getpgid(0xffffffffffffffff) syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@rand_addr, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000b00), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) fchdir(0xffffffffffffffff) getpgid(0x0) getpgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000b80)={0x0, &(0x7f0000000b40)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000000280)) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000b40)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932cbc2ebc0d64ac1e5d9f7f") 19:24:46 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:24:46 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:24:46 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:24:47 executing program 2: sysinfo(&(0x7f00000001c0)=""/145) getpgid(0xffffffffffffffff) syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@rand_addr, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000b00), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) fchdir(0xffffffffffffffff) getpgid(0x0) getpgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000b80)={0x0, &(0x7f0000000b40)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000000280)) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000b40)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932cbc2ebc0d64ac1e5d9f7f") 19:24:47 executing program 2: sysinfo(&(0x7f00000001c0)=""/145) getpgid(0xffffffffffffffff) syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@rand_addr, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000b00), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) fchdir(0xffffffffffffffff) getpgid(0x0) getpgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000b80)={0x0, &(0x7f0000000b40)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000000280)) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000b40)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932cbc2ebc0d64ac1e5d9f7f") 19:24:47 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:24:47 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:24:47 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:24:47 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) [ 380.661026] audit: type=1326 audit(1536866687.558:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9051 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 19:24:47 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:24:47 executing program 2: sysinfo(&(0x7f00000001c0)=""/145) getpgid(0xffffffffffffffff) syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@rand_addr, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000b00), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) fchdir(0xffffffffffffffff) getpgid(0x0) getpgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000b80)={0x0, &(0x7f0000000b40)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000000280)) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000b40)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932cbc2ebc0d64ac1e5d9f7f") 19:24:47 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) [ 380.914824] audit: type=1326 audit(1536866687.808:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9075 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 19:24:47 executing program 2: sysinfo(&(0x7f00000001c0)=""/145) getpgid(0xffffffffffffffff) syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@rand_addr, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000b00), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) fchdir(0xffffffffffffffff) getpgid(0x0) getpgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000b80)={0x0, &(0x7f0000000b40)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000000280)) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000b40)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932cbc2ebc0d64ac1e5d9f7f") [ 381.057182] audit: type=1326 audit(1536866687.948:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9086 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 19:24:48 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:24:48 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:24:48 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:24:48 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:24:48 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:24:48 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:24:48 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:24:49 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:24:49 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:24:49 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:24:49 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:24:49 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:24:49 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:24:50 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:24:50 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:24:50 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:24:50 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:24:50 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:24:50 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:24:51 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:24:51 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:24:51 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:24:51 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:24:51 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:24:51 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) 19:24:52 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:24:52 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:24:52 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:24:52 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:24:52 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:24:52 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) 19:24:53 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:24:53 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:24:53 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:24:53 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:24:53 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) 19:24:53 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:24:53 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:24:53 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:24:53 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:24:54 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:24:54 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:24:54 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:24:54 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:24:54 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) getgroups(0x0, &(0x7f0000005300)) 19:24:54 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:24:54 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:24:54 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:24:55 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:24:55 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) getgroups(0x0, &(0x7f0000005300)) 19:24:55 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:24:55 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:24:55 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:24:55 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:24:55 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:24:56 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) getgroups(0x0, &(0x7f0000005300)) 19:24:56 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:24:56 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:24:56 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:24:56 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:24:56 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:24:57 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:24:57 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:24:57 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:24:57 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:24:57 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:24:57 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:24:57 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:24:58 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:24:58 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:24:58 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:24:58 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:24:58 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:24:58 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:24:59 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:24:59 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:24:59 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:24:59 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:24:59 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:24:59 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:00 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:00 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:00 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:25:00 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:25:00 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:00 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:01 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:01 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:25:01 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:25:01 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:01 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:02 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:02 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:02 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:25:02 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:02 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:02 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:25:03 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:03 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:03 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:25:03 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:03 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:04 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:04 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:25:04 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:25:04 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:04 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:04 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:25:04 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:25:04 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:04 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:25:04 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:25:04 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:25:04 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:25:05 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:25:05 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:05 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:25:05 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:05 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:05 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:25:05 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:25:05 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:25:05 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:05 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:05 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:25:05 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:06 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:06 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:25:06 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:25:06 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) 19:25:06 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 399.423589] audit: type=1326 audit(1536866706.318:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9593 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 19:25:06 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:25:06 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 399.770127] audit: type=1326 audit(1536866706.658:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9603 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 19:25:06 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:06 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:06 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:25:06 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:06 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) [ 400.030485] audit: type=1326 audit(1536866706.918:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9614 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 19:25:07 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) prctl$setname(0x23, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x2000000000000037, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e50f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 19:25:07 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) [ 400.239804] audit: type=1326 audit(1536866707.128:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9627 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 400.297812] audit: type=1326 audit(1536866707.188:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9632 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 19:25:07 executing program 5: ustat(0x0, &(0x7f0000001200)) clock_gettime(0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(0xffffffffffffffff) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00'}, 0x45c) seccomp(0x0, 0x0, &(0x7f0000000100)) keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000400)={0x77359400}, &(0x7f00000000c0), 0x0) socket$rds(0x15, 0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") pipe(&(0x7f00000002c0)) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0\x00') setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000340)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) socket$inet_tcp(0x2, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000140)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) arch_prctl(0x0, &(0x7f0000000200)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) 19:25:07 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:07 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:07 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:07 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:08 executing program 4: prctl$setname(0x59616d61, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vcs\x00', 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") geteuid() lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@broadcast, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) geteuid() getgroups(0x0, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000e80)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001000)) [ 401.169049] audit: type=1326 audit(1536866708.058:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9655 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 19:25:08 executing program 5: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000540), &(0x7f0000000240)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000600), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000040)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000003c0)=""/159) setxattr(&(0x7f0000000640)='./file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.upper\x00', &(0x7f00000008c0)="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", 0xfffffffffffffd4a, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000480)) 19:25:08 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:08 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:08 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:08 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:08 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xfb, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000180)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 19:25:09 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xfb, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000180)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 19:25:09 executing program 5: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) 19:25:09 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xfb, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000180)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 19:25:09 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xfb, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000180)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 19:25:09 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:09 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:09 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x76, 0xb4) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000440)=0x7, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) sendto$inet(r0, &(0x7f0000004ac0)="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", 0x48f, 0x0, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x0) 19:25:09 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:09 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:09 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:10 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r0, &(0x7f0000004740)={&(0x7f0000000580)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000004c0)}, 0xe803) 19:25:10 executing program 5: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000540), &(0x7f0000000240)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000600), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000040)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000003c0)=""/159) chown(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000480)) 19:25:10 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:10 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:10 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:10 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:11 executing program 5: prctl$intptr(0x2f, 0x3) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000400)={{{@in=@dev, @in6=@local}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000500)=0xe8) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000600)) geteuid() fstat(r1, &(0x7f0000000640)) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000006c0)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) fstat(r0, &(0x7f00000007c0)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000940)=0xe8) getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000980)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@rand_addr, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000ac0)=0xe8) getgroups(0x2, &(0x7f0000000b00)=[0xee00, 0xee00]) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000e80)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) fcntl$getown(r2, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000001000)={{{@in=@loopback, @in=@dev}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000001100)=0xe8) lstat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) fcntl$getownex(r1, 0x10, &(0x7f0000002a00)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), &(0x7f0000002a80)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b00)={0x0, r2, 0x0, 0x2, &(0x7f0000002ac0)='\\\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000002b40)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000002c40)=0xe8) getegid() getpgrp(0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) stat(&(0x7f0000002d00)='./file0\x00', &(0x7f0000002d40)) getpid() fstat(r2, &(0x7f0000004300)) fstat(r0, &(0x7f0000004380)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000004400)) stat(&(0x7f0000004440)='./file0\x00', &(0x7f0000004480)) lstat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000005780), &(0x7f00000057c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005800)={{{@in, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000005900)=0xe8) getegid() ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000005940)) stat(&(0x7f0000005980)='./file0\x00', &(0x7f00000059c0)) stat(&(0x7f0000005a40)='./file0\x00', &(0x7f0000005a80)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 19:25:11 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:11 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) [ 404.353070] QAT: Invalid ioctl [ 404.369194] QAT: Invalid ioctl [ 404.398314] QAT: Invalid ioctl 19:25:11 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) [ 404.441364] QAT: Invalid ioctl 19:25:11 executing program 5: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:11 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:11 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:12 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:12 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:12 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:12 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:12 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:12 executing program 5: ustat(0x0, &(0x7f0000001200)) clock_gettime(0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(0xffffffffffffffff) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00'}, 0x45c) seccomp(0x0, 0x0, &(0x7f0000000100)) keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000400)={0x77359400}, &(0x7f00000000c0), 0x0) socket$rds(0x15, 0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") pipe(&(0x7f00000002c0)) symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0\x00') setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000340)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) socket$inet_tcp(0x2, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000140)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) arch_prctl(0x0, &(0x7f0000000200)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f0000000180)={0x0, &(0x7f0000000200)}) 19:25:13 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:13 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:13 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:13 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:13 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:13 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0x100000001) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000140)) 19:25:13 executing program 5: ioprio_set$uid(0x2, 0x0, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) prctl$setname(0x25, &(0x7f0000000040)='bdevselfcgroupself') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x26, &(0x7f00000000c0)='vmnet0md5sum@,cgroup@wlan1@#*^wlan1lo\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000700)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)=ANY=[], &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000004c0), 0xc) dup(0xffffffffffffffff) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, "c3c7f00418be0017d8aa1a1c1d646d2879707a57d32ce49dd0e10c79808086c5"}) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@dev, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) syz_open_dev$sndpcmp(&(0x7f0000000600)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000640)=""/156) getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), 0xc) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) geteuid() ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team0\x00'}) 19:25:14 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:14 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:14 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) 19:25:14 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:14 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:14 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:15 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:15 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000001a00)="153f6234488dd25d766070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0x10, 0xbd, &(0x7f0000000100)="bc15a54b9646cdc214c494cbfc7e04c2", &(0x7f0000000380)=""/189, 0x869c}, 0x28) 19:25:15 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) 19:25:15 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:15 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:15 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003f00)=[{{&(0x7f00000002c0)=@nfc_llcp, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000340)=""/206, 0xce}], 0x1, &(0x7f0000001b00)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000003f80)) writev(r2, &(0x7f0000000700), 0x1000000000000110) socketpair(0x10, 0x6, 0xa7e, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f00000000c0)=0x200001, 0x4) 19:25:15 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003f00)=[{{&(0x7f00000002c0)=@nfc_llcp, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000340)=""/206, 0xce}], 0x1, &(0x7f0000001b00)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000003f80)) writev(r2, &(0x7f0000000700), 0x1000000000000110) socketpair(0x10, 0x6, 0xa7e, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f00000000c0)=0x200001, 0x4) [ 408.572596] syz-executor5 (9892) used greatest stack depth: 14456 bytes left 19:25:15 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x36f) sendto$inet(r0, &(0x7f0000000900), 0x0, 0x20000800, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e319aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0001c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='cubic\x00', 0x6) shutdown(r0, 0x1) 19:25:15 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) 19:25:15 executing program 5: mlockall(0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) utime(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000240)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f0000000380)) finit_module(0xffffffffffffffff, &(0x7f0000000540)="656c6912fe7522", 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000440)={'broute\x00'}, &(0x7f0000000140)=0x78) pipe2$9p(&(0x7f0000000280), 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f00000002c0)={0x7}, 0x7) memfd_create(&(0x7f0000000680)='-/\x00', 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000880)={&(0x7f0000000700)=@deltaction={0x14}, 0x14}}, 0x0) shutdown(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") 19:25:15 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:15 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:16 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:16 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:16 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:16 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:16 executing program 5: modify_ldt$read(0x0, &(0x7f0000000200)=""/153, 0x99) select(0x40, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='\x00', 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000040)="42805da0120fef69dc0f9f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @remote}, &(0x7f00000002c0)=0x10) add_key(&(0x7f0000000480)='cifs.spnego\x00', &(0x7f00000004c0), &(0x7f0000000500), 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000600), &(0x7f0000000480), 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@dev}}, &(0x7f0000000780)=0xe8) stat(&(0x7f00000007c0)='./file1\x00', &(0x7f0000000800)) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000880)={0x90}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e00)) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000038c0)=""/32, &(0x7f0000003900)=0x20) msgget$private(0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000540)) msgrcv(0x0, &(0x7f0000000940)={0x0, ""/208}, 0xd8, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001e40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002080)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002140), 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000500)) 19:25:16 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:17 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:17 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:17 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:17 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:17 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:17 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:18 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:18 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:18 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:18 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:23 executing program 5: 19:25:23 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:23 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:23 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:23 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:23 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:23 executing program 5: 19:25:23 executing program 5: 19:25:23 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:23 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:23 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:24 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:24 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:24 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:24 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:24 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:24 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:24 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:24 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:25 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:25 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:25 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:25 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:25 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:25 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:26 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:26 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:26 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:26 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:26 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:26 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:27 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) 19:25:27 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:27 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:27 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:27 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:27 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:27 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) 19:25:27 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:28 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:28 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:28 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:28 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:28 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) 19:25:28 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:29 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:29 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:29 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:29 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:29 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:29 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:30 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:30 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:30 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:30 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:30 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:30 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:31 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:31 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:31 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:31 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:31 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:31 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:31 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:32 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:32 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:32 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:32 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:32 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:32 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:33 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:33 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:33 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:33 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:33 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:33 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:34 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:34 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:34 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:34 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:34 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:34 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:35 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:35 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:35 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:35 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:35 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:35 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:35 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:35 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:36 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:36 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:36 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:36 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:36 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:36 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:36 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:37 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:37 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:37 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:37 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:37 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:37 executing program 3: keyctl$set_reqkey_keyring(0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:37 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:37 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:37 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:38 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:38 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:38 executing program 3: keyctl$set_reqkey_keyring(0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:38 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:38 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:38 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:39 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:39 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:39 executing program 3: keyctl$set_reqkey_keyring(0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:39 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:39 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:39 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:39 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:40 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:40 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:40 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:40 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:40 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:41 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:41 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:41 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:41 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:41 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:41 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:41 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:42 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:42 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:42 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:42 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:42 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:42 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:42 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:43 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:43 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:43 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:43 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:43 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:43 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:43 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:43 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:43 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:43 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:43 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:44 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) [ 437.217562] audit: type=1326 audit(1536866744.108:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10541 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 19:25:44 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:44 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:44 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:44 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:44 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:44 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) [ 437.679891] audit: type=1326 audit(1536866744.568:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10559 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 19:25:44 executing program 3: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) 19:25:44 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) [ 437.844480] audit: type=1326 audit(1536866744.738:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10566 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 19:25:44 executing program 3: mlockall(0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) utime(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000240)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f0000000380)) finit_module(0xffffffffffffffff, &(0x7f0000000540)="656c6912fe7522", 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000440)={'broute\x00'}, &(0x7f0000000140)=0x78) pipe2$9p(&(0x7f0000000280), 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f00000002c0)={0x7}, 0x7) memfd_create(&(0x7f0000000680)='-/\x00', 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000880)={&(0x7f0000000700)=@deltaction={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") 19:25:45 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:45 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:45 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:45 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:45 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:45 executing program 3: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da0d30fef69dc0f01ee660f3a608600088041cb913591913d06c481c954882accf7fe0a00000f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") clock_gettime(0x0, &(0x7f0000000040)) setitimer(0x0, &(0x7f0000000140)={{0x0, 0x2710}}, &(0x7f00000000c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000180)={0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, 0x2c) 19:25:45 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:46 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:46 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:46 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:46 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:46 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:46 executing program 3: mlockall(0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) utime(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000240)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f0000000380)) finit_module(0xffffffffffffffff, &(0x7f0000000540)="656c6912fe7522", 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000440)={'broute\x00'}, &(0x7f0000000140)=0x78) pipe2$9p(&(0x7f0000000280), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000640)) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") 19:25:46 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:47 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:47 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:47 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:47 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:47 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:47 executing program 3: mlockall(0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) utime(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000240)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f0000000380)) finit_module(0xffffffffffffffff, &(0x7f0000000540)="656c6912fe7522", 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000440)={'broute\x00'}, &(0x7f0000000140)=0x78) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") 19:25:47 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) 19:25:48 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:48 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 19:25:48 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:48 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) 19:25:48 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:48 executing program 3: kexec_load(0x0, 0x0, &(0x7f00000005c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01eece41ff0f18370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000080), 0x4) getpgid(0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000380)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000003c0)) getpgid(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 'syz1\x00'}) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) rename(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000340)='./file0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, &(0x7f00000002c0)) chroot(&(0x7f0000000280)='./file0\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 19:25:48 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) [ 442.184296] kasan: CONFIG_KASAN_INLINE enabled [ 442.202846] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 442.234812] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 442.241062] CPU: 0 PID: 10689 Comm: syz-executor3 Not tainted 4.19.0-rc3-next-20180913+ #73 [ 442.249556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.258920] RIP: 0010:reconfigure_super+0x48e/0xbb0 [ 442.263932] Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 62 05 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 03 48 8d 78 30 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 4d 05 00 00 48 8b 40 30 48 85 c0 48 89 85 20 ff [ 442.282829] RSP: 0018:ffff88014a0778d8 EFLAGS: 00010206 [ 442.288198] RAX: 0000000000000000 RBX: ffff88014a0779f8 RCX: 0000000000000006 [ 442.295460] RDX: dffffc0000000000 RSI: ffffffff81cdbc5b RDI: 0000000000000030 [ 442.302722] RBP: ffff88014a0779c8 R08: ffff8801cf232580 R09: fffffbfff12c24e5 [ 442.309984] R10: fffffbfff12c24e5 R11: ffffffff8961272b R12: ffff88013dfb8240 [ 442.317250] R13: 1ffff1002940ef20 R14: 0000000000000000 R15: ffff88014a077adc [ 442.324524] FS: 00007f3349d79700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 442.332750] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 442.338644] CR2: 00007f3349d57db8 CR3: 00000001c0449000 CR4: 00000000001406f0 [ 442.345921] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 442.353217] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 442.360475] Call Trace: [ 442.363096] ? user_get_super+0x250/0x250 [ 442.367375] ? down_write+0x8a/0x130 [ 442.371089] ? do_umount_root+0x218/0x320 [ 442.375246] ? down_read+0x120/0x120 [ 442.378958] do_umount_root+0x2b1/0x320 [ 442.382926] ? namespace_unlock+0x210/0x210 [ 442.387244] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 442.392794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.398339] ? ns_capable_common+0x13f/0x170 [ 442.402757] ksys_umount+0x8b6/0x1230 [ 442.406557] ? rcu_softirq_qs+0x20/0x20 [ 442.410527] ? dput.part.25+0x241/0x790 [ 442.414507] ? check_preemption_disabled+0x48/0x200 [ 442.419529] ? __detach_mounts+0x430/0x430 [ 442.423760] ? rcu_softirq_qs+0x20/0x20 [ 442.427756] ? mnt_get_count+0x150/0x150 [ 442.431823] ? dput.part.25+0x26d/0x790 [ 442.435799] ? shrink_dcache_sb+0x350/0x350 [ 442.440119] ? current_umask+0x70/0x70 [ 442.444008] ? __x64_sys_futex+0x47f/0x6a0 [ 442.448270] ? do_syscall_64+0x9a/0x820 [ 442.452245] ? do_syscall_64+0x9a/0x820 [ 442.456223] ? lockdep_hardirqs_on+0x421/0x5c0 [ 442.460807] ? trace_hardirqs_on+0xbd/0x310 [ 442.465130] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.470495] ? trace_hardirqs_off_caller+0x300/0x300 [ 442.475594] ? ksys_mount+0xa8/0x140 [ 442.479321] __x64_sys_umount+0x54/0x80 [ 442.483297] do_syscall_64+0x1b9/0x820 [ 442.487202] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 442.492597] ? syscall_return_slowpath+0x5e0/0x5e0 [ 442.497521] ? trace_hardirqs_off+0x310/0x310 [ 442.502038] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 442.507051] ? recalc_sigpending_tsk+0x180/0x180 [ 442.511832] ? kasan_check_write+0x14/0x20 [ 442.516076] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 442.520924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.526111] RIP: 0033:0x4572d9 19:25:49 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000700), &(0x7f0000000740)='ppp0\\^.trusted]\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") [ 442.529306] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 442.548225] RSP: 002b:00007f3349d78c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 442.553142] kobject: 'loop4' (000000005c48d1a2): kobject_uevent_env [ 442.555933] RAX: ffffffffffffffda RBX: 00007f3349d796d4 RCX: 00000000004572d9 [ 442.555942] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 442.555951] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 442.555959] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 442.555968] R13: 00000000004d7ba8 R14: 00000000004caa53 R15: 0000000000000001 [ 442.555982] Modules linked in: [ 442.574614] kobject: 'loop4' (000000005c48d1a2): fill_kobj_path: path = '/devices/virtual/block/loop4' 19:25:49 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) 19:25:49 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) [ 442.695026] kobject: 'loop0' (00000000707ac8b9): kobject_uevent_env [ 442.715267] kobject: 'loop0' (00000000707ac8b9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 442.767276] kobject: 'loop1' (000000007fdae258): kobject_uevent_env [ 442.784097] kobject: 'loop1' (000000007fdae258): fill_kobj_path: path = '/devices/virtual/block/loop1' 19:25:49 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) [ 442.830889] ---[ end trace 75fd5c956aab1651 ]--- [ 442.836361] RIP: 0010:reconfigure_super+0x48e/0xbb0 [ 442.868903] kobject: 'loop5' (0000000041e93bed): kobject_uevent_env 19:25:49 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) [ 442.879938] kobject: 'loop5' (0000000041e93bed): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 442.930051] kobject: 'loop2' (00000000625c5d9a): kobject_uevent_env [ 442.950801] kobject: 'loop2' (00000000625c5d9a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 443.100780] Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 62 05 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 03 48 8d 78 30 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 4d 05 00 00 48 8b 40 30 48 85 c0 48 89 85 20 ff [ 443.158045] RSP: 0018:ffff88014a0778d8 EFLAGS: 00010206 [ 443.178842] RAX: 0000000000000000 RBX: ffff88014a0779f8 RCX: 0000000000000006 19:25:50 executing program 0: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) [ 443.509336] kobject: 'loop0' (00000000707ac8b9): kobject_uevent_env [ 443.520997] kobject: 'loop0' (00000000707ac8b9): fill_kobj_path: path = '/devices/virtual/block/loop0' 19:25:50 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) request_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840), &(0x7f0000000880)='selinuxeth0---$\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0), 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000900)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4d757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8a408039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a0800000000000000c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a00), &(0x7f0000000b00)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}, &(0x7f00000005c0)=0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)}, &(0x7f0000000680)=0x10) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000008c0)={0x30}, 0x30) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000300), 0x4) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000a40)) utimensat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000a80), 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") [ 443.582187] RDX: dffffc0000000000 RSI: ffffffff81cdbc5b RDI: 0000000000000030 [ 443.618288] RBP: ffff88014a0779c8 R08: ffff8801cf232580 R09: fffffbfff12c24e5 19:25:50 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000005340)='vmnet1ppp1selfvboxnet1{vmnet1,em1GPL\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000053c0)='./file0\x00', &(0x7f0000005400)) [ 443.637303] kobject: 'loop4' (000000005c48d1a2): kobject_uevent_env [ 443.646385] kobject: 'loop4' (000000005c48d1a2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 443.657006] R10: fffffbfff12c24e5 R11: ffffffff8961272b R12: ffff88013dfb8240 [ 443.685697] kobject: 'loop1' (000000007fdae258): kobject_uevent_env [ 443.700125] R13: 1ffff1002940ef20 R14: 0000000000000000 R15: ffff88014a077adc [ 443.715411] kobject: 'loop1' (000000007fdae258): fill_kobj_path: path = '/devices/virtual/block/loop1' 19:25:50 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresuid(&(0x7f0000000440), &(0x7f0000000640), &(0x7f0000000680)) getpgrp(0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000000a80), 0x0, &(0x7f0000000b00)}, 0x0) close(0xffffffffffffffff) getrusage(0x0, &(0x7f0000000b40)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000e80)='attr/current\x00') ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000ec0)) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000480)=""/176}, 0x18) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) inotify_init() ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) stat(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000540)) process_vm_writev(0x0, &(0x7f0000000600), 0x0, &(0x7f0000000dc0), 0x0, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 19:25:50 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgroups(0x0, &(0x7f00000009c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getegid() gettid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003580), &(0x7f00000035c0)=0xc) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) openat$rtc(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003740)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000003700)='/proc/self/net/pfkey\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003880)=0xe8) lstat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000004b40)='/dev/null\x00', 0xffffffffffffffff}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004bc0), &(0x7f0000004c00)=0xc) getpgrp(0xffffffffffffffff) geteuid() getresgid(&(0x7f0000004e80), &(0x7f0000004ec0), &(0x7f0000004f00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) fstat(0xffffffffffffffff, &(0x7f00000050c0)) stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005200), &(0x7f0000005240)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) [ 443.735887] FS: 00007f3349d79700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 443.765757] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 443.778509] kobject: 'loop5' (0000000041e93bed): kobject_uevent_env [ 443.803844] kobject: 'loop5' (0000000041e93bed): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 443.824030] CR2: 0000001b2fa22000 CR3: 00000001c0449000 CR4: 00000000001406f0 [ 443.834834] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 443.850833] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 443.866506] kobject: 'loop2' (00000000625c5d9a): kobject_uevent_env [ 443.871420] Kernel panic - not syncing: Fatal exception [ 443.879326] Kernel Offset: disabled [ 443.882959] Rebooting in 86400 seconds..