], @broadcast}}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000004580)=0xe8) getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000045c0)={{{@in6=@dev, @in6=@local}}, {{}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000046c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000200)="1c8e805da0616969692295d3200f01ee5a41ff0f1837370f38211ac4c4c3996b6205d8c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b755b498985fc3") 03:35:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0xae44, &(0x7f0000000000)) 03:35:10 executing program 0: lstat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0)) getgroups(0x2ea, &(0x7f0000000a40)) mount$9p_xen(&(0x7f0000000480)='-:{*\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000b80)={'bond_slave_1\x00'}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6, @in6=@mcast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000006c0)=0xe8) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000280)={0x20}, 0x20) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000940)) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, &(0x7f0000000900)=ANY=[], 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000200), 0x4) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000d80)=""/153, &(0x7f0000000d40)=0x28) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000a80)={'nat\x00'}, &(0x7f0000000540)=0x54) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000600)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f00000002c0)={{0x2, 0x0, @rand_addr}, {0x0, @random="419205671896"}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6gre0\x00'}) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0xffffffffffffff8d) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xfd74) getuid() ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000700)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000580)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f00000004c0)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000b00)) getgid() shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x0) shmdt(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000440)) 03:35:10 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000100)) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=0x4) mkdir(&(0x7f0000002880)='./file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000200)={0x0, @broadcast, @remote}, &(0x7f00000002c0)=0xc) getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0), 0x4) clock_gettime(0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000340)}}, &(0x7f0000000400)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000007c0)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @dev}}}, 0x108) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in=@rand_addr, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000900)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001340)={{{@in=@local, @in6}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000ac0)=0xfffffffffffffccd) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c00)=0x14) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) nanosleep(&(0x7f0000000740), &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gretap0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) syz_execute_func(&(0x7f0000000580)="428055a0766969ef69dc00d99066418955a4e088d557207c2a06c46129ef950000002140a564a70d157a9e400f01efe5e5417545c4e37d6d5200002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f7e") 03:35:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0xae44, &(0x7f0000000000)) 03:35:10 executing program 2: dup(0xffffffffffffff9c) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) socket$inet(0x2, 0x0, 0xffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:35:10 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:35:10 executing program 1: clock_getres(0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@local, @in6}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast1, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000740)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000780)={0x0, @broadcast, @broadcast}, &(0x7f00000007c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000800)={{{@in=@remote, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000940)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000a80)={0x0, @broadcast}, &(0x7f0000000ac0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000bc0)=0x14, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000140), &(0x7f0000000180)=0xc) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:35:11 executing program 3: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000018c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001900)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000002b00)="5b2d70726f637d656d31b800"}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in, @in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002c80)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002cc0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000002d00)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000003000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004480)={{{@in6, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000004580)=0xe8) getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000045c0)={{{@in6=@dev, @in6=@local}}, {{}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000046c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000200)="1c8e805da0616969692295d3200f01ee5a41ff0f1837370f38211ac4c4c3996b6205d8c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b755b498985fc3") 03:35:11 executing program 0: keyctl$set_reqkey_keyring(0x2, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:11 executing program 5: clock_gettime(0x9, &(0x7f0000001100)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1a0f1808e29866450ff61f7f") 03:35:11 executing program 2: dup(0xffffffffffffff9c) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) socket$inet(0x2, 0x0, 0xffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:35:11 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:35:11 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000004000)) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f0000008000)={{&(0x7f0000cf7000/0x4000)=nil, 0x4000}, 0x7fffdf308000, 0xffff8000}) 03:35:11 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000004000)) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f0000008000)={{&(0x7f0000cf7000/0x4000)=nil, 0x4000}, 0x7fffdf308000, 0xffff8000}) 03:35:11 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000004000)) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f0000008000)={{&(0x7f0000cf7000/0x4000)=nil, 0x4000}, 0x7fffdf308000, 0xffff8000}) 03:35:11 executing program 3: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000004c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) pipe(&(0x7f00000001c0)) syz_genetlink_get_family_id$team(&(0x7f0000001040)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000400)={'bridge_slave_0\x00'}) accept4(0xffffffffffffffff, &(0x7f00000005c0)=@xdp, &(0x7f0000000700)=0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) clock_gettime(0x0, &(0x7f0000001640)) recvmmsg(0xffffffffffffffff, &(0x7f00000015c0), 0x0, 0x0, &(0x7f0000001680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000016c0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000017c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900), &(0x7f0000001940)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001ac0)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001b00)={{{@in=@multicast1, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000001c00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001c80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001cc0)={0x0, @empty, @loopback}, &(0x7f0000001d00)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001d40)={@mcast2}, &(0x7f0000001d80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001e80), &(0x7f0000001ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001f00)={'eql\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002940)={@ipv4={[], [], @rand_addr}}, &(0x7f0000002980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000029c0)={{{@in6=@ipv4={[], [], @remote}, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000002ac0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004640)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004780)={{{@in6, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000004880)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000048c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004a80)={'ip6tnl0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004b00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004b40)={{{@in=@remote, @in6=@mcast2}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000004c40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005640)={&(0x7f0000000200), 0xc, &(0x7f0000005600)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/udp\x00') getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4}}, &(0x7f0000000040)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:35:12 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000004000)) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f0000008000)={{&(0x7f0000cf7000/0x4000)=nil, 0x4000}, 0x7fffdf308000, 0xffff8000}) 03:35:12 executing program 0: keyctl$set_reqkey_keyring(0x2, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:12 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f00000001c0)=[{&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/124, 0x7c}], 0x2) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 03:35:12 executing program 5: clock_gettime(0x9, &(0x7f0000001100)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1a0f1808e29866450ff61f7f") 03:35:12 executing program 2: dup(0xffffffffffffff9c) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) socket$inet(0x2, 0x0, 0xffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) creat(&(0x7f0000000040)='./file0\x00', 0x0) setns(0xffffffffffffffff, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") [ 1853.571306] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1853.593490] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1853.627945] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1853.656081] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1853.671162] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1853.686476] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1853.702577] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1853.716927] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 03:35:12 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) [ 1853.732381] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1853.747480] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1853.776297] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1853.808410] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz1 [ 1853.871818] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1853.903696] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1853.930551] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1853.949936] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1853.979243] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1853.999774] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1854.022421] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1854.046394] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1854.072715] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1854.102161] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1854.123986] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1854.158713] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz1] on syz1 03:35:12 executing program 3: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000004c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) pipe(&(0x7f00000001c0)) syz_genetlink_get_family_id$team(&(0x7f0000001040)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000400)={'bridge_slave_0\x00'}) accept4(0xffffffffffffffff, &(0x7f00000005c0)=@xdp, &(0x7f0000000700)=0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) clock_gettime(0x0, &(0x7f0000001640)) recvmmsg(0xffffffffffffffff, &(0x7f00000015c0), 0x0, 0x0, &(0x7f0000001680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000016c0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000017c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900), &(0x7f0000001940)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001ac0)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001b00)={{{@in=@multicast1, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000001c00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001c80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001cc0)={0x0, @empty, @loopback}, &(0x7f0000001d00)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001d40)={@mcast2}, &(0x7f0000001d80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001e80), &(0x7f0000001ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001f00)={'eql\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002940)={@ipv4={[], [], @rand_addr}}, &(0x7f0000002980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000029c0)={{{@in6=@ipv4={[], [], @remote}, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000002ac0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004640)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004780)={{{@in6, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000004880)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000048c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004a80)={'ip6tnl0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004b00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004b40)={{{@in=@remote, @in6=@mcast2}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000004c40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005640)={&(0x7f0000000200), 0xc, &(0x7f0000005600)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/udp\x00') getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4}}, &(0x7f0000000040)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:35:12 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f00000001c0)=[{&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/124, 0x7c}], 0x2) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 03:35:13 executing program 0: keyctl$set_reqkey_keyring(0x2, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 1854.322434] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1854.339222] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1854.368108] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1854.400079] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1854.425082] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1854.442057] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1854.458727] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 03:35:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xbfc7010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) [ 1854.475088] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1854.489818] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1854.512223] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 03:35:13 executing program 5: clock_gettime(0x9, &(0x7f0000001100)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1a0f1808e29866450ff61f7f") [ 1854.529252] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 1854.550095] hid-generic 0000:0000:0000.0008: hidraw0: HID v0.00 Device [syz1] on syz1 03:35:13 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f00000001c0)=[{&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/124, 0x7c}], 0x2) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 03:35:13 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") pipe(&(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) [ 1854.730717] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 1854.745057] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 1854.773433] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 1854.799370] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 1854.821001] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 1854.836209] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 1854.860425] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 1854.881394] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 1854.897360] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 1854.911043] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 1854.929624] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 1854.953484] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz1] on syz1 03:35:13 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f00000001c0)=[{&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/124, 0x7c}], 0x2) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) 03:35:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xbfc7010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) [ 1855.073851] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1855.083086] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1855.108536] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 03:35:13 executing program 3: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000004c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) pipe(&(0x7f00000001c0)) syz_genetlink_get_family_id$team(&(0x7f0000001040)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000400)={'bridge_slave_0\x00'}) accept4(0xffffffffffffffff, &(0x7f00000005c0)=@xdp, &(0x7f0000000700)=0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) clock_gettime(0x0, &(0x7f0000001640)) recvmmsg(0xffffffffffffffff, &(0x7f00000015c0), 0x0, 0x0, &(0x7f0000001680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000016c0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000017c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900), &(0x7f0000001940)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001ac0)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001b00)={{{@in=@multicast1, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000001c00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001c80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001cc0)={0x0, @empty, @loopback}, &(0x7f0000001d00)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001d40)={@mcast2}, &(0x7f0000001d80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001e80), &(0x7f0000001ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001f00)={'eql\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002940)={@ipv4={[], [], @rand_addr}}, &(0x7f0000002980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000029c0)={{{@in6=@ipv4={[], [], @remote}, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000002ac0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004640)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004780)={{{@in6, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000004880)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000048c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004a80)={'ip6tnl0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004b00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004b40)={{{@in=@remote, @in6=@mcast2}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000004c40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005640)={&(0x7f0000000200), 0xc, &(0x7f0000005600)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/udp\x00') getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4}}, &(0x7f0000000040)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") [ 1855.137161] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1855.176852] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1855.199976] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1855.209584] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1855.221664] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 03:35:13 executing program 0: keyctl$set_reqkey_keyring(0x2, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 1855.252504] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1855.283347] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1855.308661] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 1855.333334] hid-generic 0000:0000:0000.000A: hidraw0: HID v0.00 Device [syz1] on syz1 03:35:14 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffd) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) clock_gettime(0x0, &(0x7f0000001680)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair(0x0, 0x0, 0x0, &(0x7f0000000d00)) clone(0x0, &(0x7f0000000640), &(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) sendmmsg(0xffffffffffffffff, &(0x7f0000001480), 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f00000008c0)=""/229, 0xe5, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x10, &(0x7f0000000600)={&(0x7f0000000740)=""/209, 0xd1}}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") add_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000001c0), &(0x7f0000000700)='team0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)) set_tid_address(&(0x7f0000000440)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000180)={'bcsf0\x00', @ifru_ivalue}) syz_genetlink_get_family_id$team(&(0x7f00000009c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000c40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000dc0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000f80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000007440), &(0x7f0000007480)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000074c0)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000075c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007600)={0x0, @broadcast, @remote}, &(0x7f0000007640)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000007680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000076c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000007700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007740)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007780)={{{@in=@dev}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000007880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007940)={0x0, @broadcast, @remote}, &(0x7f0000007980)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007a00)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007a80)={@mcast2}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007b80)={{{@in6=@mcast1, @in6}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000007c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007cc0)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000007dc0), &(0x7f0000007e00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007e40)={@dev}, &(0x7f0000007e80)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007ec0), &(0x7f0000007f00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000080c0)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f00000081c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008200)={0x0, @multicast1, @remote}, &(0x7f0000008240)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'ip_vti0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008380)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000083c0)={'team0\x00'}) getpeername(0xffffffffffffffff, &(0x7f0000008640)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000086c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008700)={{{@in=@local, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000008800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008840)={{{@in6=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000008940)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008b80)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000008c80)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000009780)={&(0x7f0000000680), 0xc, &(0x7f0000009740)={&(0x7f00000021c0)=ANY=[]}}, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000400), 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 03:35:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xbfc7010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 03:35:14 executing program 5: clock_gettime(0x9, &(0x7f0000001100)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getresuid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1a0f1808e29866450ff61f7f") 03:35:14 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80084121, &(0x7f0000001f64)) 03:35:14 executing program 1: socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x2000000000000067, &(0x7f0000000040)}) dup(0xffffffffffffffff) getuid() getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000740)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getgid() geteuid() getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000d40)=0xe8) getresgid(&(0x7f0000000d80), &(0x7f0000000dc0), &(0x7f0000000e00)) getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getresuid(&(0x7f0000000fc0), &(0x7f0000001000), &(0x7f0000001040)) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000001580)=0xe8) getresgid(&(0x7f00000015c0), &(0x7f0000001600), &(0x7f0000001640)) geteuid() getegid() stat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000001740)) getegid() openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@remote, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000001900)=0xe8) getgroups(0x0, &(0x7f0000001940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002200)='cgroup.subtree_control\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002240)={{{@in=@local, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000002340)=0xe8) getgroups(0x0, &(0x7f0000002380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0xbfc7010000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 03:35:14 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80084121, &(0x7f0000001f64)) 03:35:14 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80084121, &(0x7f0000001f64)) 03:35:14 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80084121, &(0x7f0000001f64)) 03:35:14 executing program 3: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000004c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) pipe(&(0x7f00000001c0)) syz_genetlink_get_family_id$team(&(0x7f0000001040)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000400)={'bridge_slave_0\x00'}) accept4(0xffffffffffffffff, &(0x7f00000005c0)=@xdp, &(0x7f0000000700)=0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) clock_gettime(0x0, &(0x7f0000001640)) recvmmsg(0xffffffffffffffff, &(0x7f00000015c0), 0x0, 0x0, &(0x7f0000001680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000016c0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000017c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900), &(0x7f0000001940)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001ac0)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001b00)={{{@in=@multicast1, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000001c00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001c80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001cc0)={0x0, @empty, @loopback}, &(0x7f0000001d00)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001d40)={@mcast2}, &(0x7f0000001d80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001e80), &(0x7f0000001ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001f00)={'eql\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002940)={@ipv4={[], [], @rand_addr}}, &(0x7f0000002980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000029c0)={{{@in6=@ipv4={[], [], @remote}, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000002ac0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004640)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004780)={{{@in6, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000004880)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000048c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004a80)={'ip6tnl0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004b00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004b40)={{{@in=@remote, @in6=@mcast2}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000004c40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005640)={&(0x7f0000000200), 0xc, &(0x7f0000005600)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/udp\x00') getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4}}, &(0x7f0000000040)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:35:14 executing program 0: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)="6b657972696e676b657972696e67cd6370757365747b2c656d31626465765e5b2300"}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:14 executing program 2: getpid() fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000300)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000005080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getpgid(0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000003c0)={{}, 0x0, 0x0, "6964be0000000000000000000000000000000000000000000000000000e7ffffffffffffff00", 'timer0\x00'}) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@mcast2, @in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@local, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000d00)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@local}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000e40)=0xe8) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000f80)=0xe8) stat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) getuid() fstat(0xffffffffffffffff, &(0x7f00000014c0)) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000016c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000017c0)=0xe8) getresgid(&(0x7f0000001800), &(0x7f0000001840), &(0x7f0000001880)) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001d40)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) getegid() getuid() getresgid(&(0x7f0000001e40), &(0x7f0000001e80), &(0x7f0000001ec0)) stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:14 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r0, &(0x7f00000000c0), 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local}, @in6={0xa, 0x0, 0x0, @remote}, @in={0x2, 0x0, @rand_addr}, @in={0x2, 0x0, @multicast1}], 0x4c) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0xa00) 03:35:15 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r0, &(0x7f00000000c0), 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local}, @in6={0xa, 0x0, 0x0, @remote}, @in={0x2, 0x0, @rand_addr}, @in={0x2, 0x0, @multicast1}], 0x4c) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0xa00) 03:35:15 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r0, &(0x7f00000000c0), 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local}, @in6={0xa, 0x0, 0x0, @remote}, @in={0x2, 0x0, @rand_addr}, @in={0x2, 0x0, @multicast1}], 0x4c) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0xa00) 03:35:15 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000980), &(0x7f0000000500)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000180)='yam0\x00', 0xffffffffffffffff}, 0x30) request_key(&(0x7f0000000a80)='cifs.spnego\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='ppp0selfcpuset%\x00', 0x0) add_key$keyring(&(0x7f0000000800)='keyring\x00', &(0x7f0000000840), 0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480), 0x4) socket$nl_generic(0x10, 0x3, 0x10) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000900)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000640), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[], 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) getrusage(0x0, &(0x7f0000000040)) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000040), 0x0) 03:35:15 executing program 1: socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x2000000000000067, &(0x7f0000000040)}) dup(0xffffffffffffffff) getuid() getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000740)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getgid() geteuid() getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000d40)=0xe8) getresgid(&(0x7f0000000d80), &(0x7f0000000dc0), &(0x7f0000000e00)) getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getresuid(&(0x7f0000000fc0), &(0x7f0000001000), &(0x7f0000001040)) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000001580)=0xe8) getresgid(&(0x7f00000015c0), &(0x7f0000001600), &(0x7f0000001640)) geteuid() getegid() stat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000001740)) getegid() openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@remote, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000001900)=0xe8) getgroups(0x0, &(0x7f0000001940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002200)='cgroup.subtree_control\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002240)={{{@in=@local, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000002340)=0xe8) getgroups(0x0, &(0x7f0000002380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:15 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r0, &(0x7f00000000c0), 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @local}, @in6={0xa, 0x0, 0x0, @remote}, @in={0x2, 0x0, @rand_addr}, @in={0x2, 0x0, @multicast1}], 0x4c) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0xa00) 03:35:15 executing program 4: stat(&(0x7f00000001c0)='./file1\x00', &(0x7f00000013c0)) getegid() stat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) setgroups(0x0, &(0x7f0000001500)) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000003380)) recvmmsg(0xffffffffffffffff, &(0x7f0000003240), 0x0, 0x0, &(0x7f00000033c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000003480), &(0x7f00000044c0)=0xfffffffffffffedd) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getpgrp(0xffffffffffffffff) getpgid(0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000080)) clock_getres(0x0, &(0x7f0000001280)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f00000012c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r3, r2, 0x8, 0x0) vmsplice(r1, &(0x7f0000002480)=[{&(0x7f0000002400)="b9", 0x1}], 0x1, 0x0) close(r1) writev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)="7a8c", 0x2}], 0x1) 03:35:15 executing program 0: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)="6b657972696e676b657972696e67cd6370757365747b2c656d31626465765e5b2300"}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:15 executing program 2: getpid() fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000300)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000005080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getpgid(0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000003c0)={{}, 0x0, 0x0, "6964be0000000000000000000000000000000000000000000000000000e7ffffffffffffff00", 'timer0\x00'}) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@mcast2, @in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@local, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000d00)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@local}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000e40)=0xe8) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000f80)=0xe8) stat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) getuid() fstat(0xffffffffffffffff, &(0x7f00000014c0)) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000016c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000017c0)=0xe8) getresgid(&(0x7f0000001800), &(0x7f0000001840), &(0x7f0000001880)) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001d40)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) getegid() getuid() getresgid(&(0x7f0000001e40), &(0x7f0000001e80), &(0x7f0000001ec0)) stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r3, r2, 0x8, 0x0) vmsplice(r1, &(0x7f0000002480)=[{&(0x7f0000002400)="b9", 0x1}], 0x1, 0x0) close(r1) writev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)="7a8c", 0x2}], 0x1) 03:35:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r3, r2, 0x8, 0x0) vmsplice(r1, &(0x7f0000002480)=[{&(0x7f0000002400)="b9", 0x1}], 0x1, 0x0) close(r1) writev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)="7a8c", 0x2}], 0x1) 03:35:16 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000980), &(0x7f0000000500)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000180)='yam0\x00', 0xffffffffffffffff}, 0x30) request_key(&(0x7f0000000a80)='cifs.spnego\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='ppp0selfcpuset%\x00', 0x0) add_key$keyring(&(0x7f0000000800)='keyring\x00', &(0x7f0000000840), 0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480), 0x4) socket$nl_generic(0x10, 0x3, 0x10) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000900)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000640), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[], 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) getrusage(0x0, &(0x7f0000000040)) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000040), 0x0) 03:35:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r3, r2, 0x8, 0x0) vmsplice(r1, &(0x7f0000002480)=[{&(0x7f0000002400)="b9", 0x1}], 0x1, 0x0) close(r1) writev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)="7a8c", 0x2}], 0x1) 03:35:16 executing program 1: socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x2000000000000067, &(0x7f0000000040)}) dup(0xffffffffffffffff) getuid() getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000740)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getgid() geteuid() getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000d40)=0xe8) getresgid(&(0x7f0000000d80), &(0x7f0000000dc0), &(0x7f0000000e00)) getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getresuid(&(0x7f0000000fc0), &(0x7f0000001000), &(0x7f0000001040)) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000001580)=0xe8) getresgid(&(0x7f00000015c0), &(0x7f0000001600), &(0x7f0000001640)) geteuid() getegid() stat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000001740)) getegid() openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@remote, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000001900)=0xe8) getgroups(0x0, &(0x7f0000001940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002200)='cgroup.subtree_control\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002240)={{{@in=@local, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000002340)=0xe8) getgroups(0x0, &(0x7f0000002380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:16 executing program 4: stat(&(0x7f00000001c0)='./file1\x00', &(0x7f00000013c0)) getegid() stat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) setgroups(0x0, &(0x7f0000001500)) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000003380)) recvmmsg(0xffffffffffffffff, &(0x7f0000003240), 0x0, 0x0, &(0x7f00000033c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000003480), &(0x7f00000044c0)=0xfffffffffffffedd) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getpgrp(0xffffffffffffffff) getpgid(0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000080)) clock_getres(0x0, &(0x7f0000001280)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f00000012c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r3, r2, 0x8, 0x0) vmsplice(r1, &(0x7f0000002480)=[{&(0x7f0000002400)="b9", 0x1}], 0x1, 0x0) close(r1) writev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)="7a8c", 0x2}], 0x1) 03:35:16 executing program 0: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)="6b657972696e676b657972696e67cd6370757365747b2c656d31626465765e5b2300"}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:16 executing program 2: getpid() fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000300)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000005080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getpgid(0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000003c0)={{}, 0x0, 0x0, "6964be0000000000000000000000000000000000000000000000000000e7ffffffffffffff00", 'timer0\x00'}) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@mcast2, @in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@local, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000d00)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@local}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000e40)=0xe8) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000f80)=0xe8) stat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) getuid() fstat(0xffffffffffffffff, &(0x7f00000014c0)) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000016c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000017c0)=0xe8) getresgid(&(0x7f0000001800), &(0x7f0000001840), &(0x7f0000001880)) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001d40)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) getegid() getuid() getresgid(&(0x7f0000001e40), &(0x7f0000001e80), &(0x7f0000001ec0)) stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r3, r2, 0x8, 0x0) vmsplice(r1, &(0x7f0000002480)=[{&(0x7f0000002400)="b9", 0x1}], 0x1, 0x0) close(r1) writev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)="7a8c", 0x2}], 0x1) 03:35:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r3, r2, 0x8, 0x0) vmsplice(r1, &(0x7f0000002480)=[{&(0x7f0000002400)="b9", 0x1}], 0x1, 0x0) close(r1) writev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)="7a8c", 0x2}], 0x1) 03:35:17 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000980), &(0x7f0000000500)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000180)='yam0\x00', 0xffffffffffffffff}, 0x30) request_key(&(0x7f0000000a80)='cifs.spnego\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='ppp0selfcpuset%\x00', 0x0) add_key$keyring(&(0x7f0000000800)='keyring\x00', &(0x7f0000000840), 0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480), 0x4) socket$nl_generic(0x10, 0x3, 0x10) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000900)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000640), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[], 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) getrusage(0x0, &(0x7f0000000040)) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000040), 0x0) 03:35:17 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000a80)='system.posix_acl_access\x00'}, 0x30) syz_open_procfs(0x0, &(0x7f0000000b00)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") syz_genetlink_get_family_id$team(&(0x7f0000001cc0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@loopback, @local}, &(0x7f0000000680)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'bpq0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'lo\x00'}) recvmsg(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000000740)=@hci, 0x80, &(0x7f0000000b80), 0x0, &(0x7f0000000c00)=""/4096, 0x1000}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@rand_addr, @in6=@local}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@remote, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000480)=0xe8) getgid() lstat(&(0x7f0000000500)='./file0\x00', &(0x7f00000008c0)) getresgid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[], 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001f40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@dev, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002300)={@dev, @local}, &(0x7f0000002340)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'veth1_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002400)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'bpq0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003fc0)={@remote}, &(0x7f0000004000)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004080)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000040c0)={@loopback}, &(0x7f0000004100)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000004200), &(0x7f0000004240)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000042c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004380)={{{@in6, @in6=@ipv4={[], [], @remote}}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000004480)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000044c0)={@loopback}, &(0x7f0000004500)=0x14) 03:35:17 executing program 1: socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x2000000000000067, &(0x7f0000000040)}) dup(0xffffffffffffffff) getuid() getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000740)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getgid() geteuid() getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000d40)=0xe8) getresgid(&(0x7f0000000d80), &(0x7f0000000dc0), &(0x7f0000000e00)) getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getresuid(&(0x7f0000000fc0), &(0x7f0000001000), &(0x7f0000001040)) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000001580)=0xe8) getresgid(&(0x7f00000015c0), &(0x7f0000001600), &(0x7f0000001640)) geteuid() getegid() stat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000001740)) getegid() openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@remote, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000001900)=0xe8) getgroups(0x0, &(0x7f0000001940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002200)='cgroup.subtree_control\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002240)={{{@in=@local, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000002340)=0xe8) getgroups(0x0, &(0x7f0000002380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:17 executing program 4: stat(&(0x7f00000001c0)='./file1\x00', &(0x7f00000013c0)) getegid() stat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) setgroups(0x0, &(0x7f0000001500)) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000003380)) recvmmsg(0xffffffffffffffff, &(0x7f0000003240), 0x0, 0x0, &(0x7f00000033c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000003480), &(0x7f00000044c0)=0xfffffffffffffedd) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getpgrp(0xffffffffffffffff) getpgid(0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000080)) clock_getres(0x0, &(0x7f0000001280)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f00000012c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:17 executing program 0: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)="6b657972696e676b657972696e67cd6370757365747b2c656d31626465765e5b2300"}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:17 executing program 2: getpid() fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000300)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000005080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getpgid(0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f00000003c0)={{}, 0x0, 0x0, "6964be0000000000000000000000000000000000000000000000000000e7ffffffffffffff00", 'timer0\x00'}) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@mcast2, @in=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@local, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000d00)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@local}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000e40)=0xe8) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000f80)=0xe8) stat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) getuid() fstat(0xffffffffffffffff, &(0x7f00000014c0)) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000016c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000017c0)=0xe8) getresgid(&(0x7f0000001800), &(0x7f0000001840), &(0x7f0000001880)) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001d40)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) getegid() getuid() getresgid(&(0x7f0000001e40), &(0x7f0000001e80), &(0x7f0000001ec0)) stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:18 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000980), &(0x7f0000000500)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000180)='yam0\x00', 0xffffffffffffffff}, 0x30) request_key(&(0x7f0000000a80)='cifs.spnego\x00', &(0x7f0000000ac0), &(0x7f0000000b00)='ppp0selfcpuset%\x00', 0x0) add_key$keyring(&(0x7f0000000800)='keyring\x00', &(0x7f0000000840), 0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480), 0x4) socket$nl_generic(0x10, 0x3, 0x10) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000900)=ANY=[]) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000640), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[], 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) getrusage(0x0, &(0x7f0000000040)) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000040), 0x0) 03:35:18 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000a80)='system.posix_acl_access\x00'}, 0x30) syz_open_procfs(0x0, &(0x7f0000000b00)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") syz_genetlink_get_family_id$team(&(0x7f0000001cc0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@loopback, @local}, &(0x7f0000000680)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'bpq0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'lo\x00'}) recvmsg(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000000740)=@hci, 0x80, &(0x7f0000000b80), 0x0, &(0x7f0000000c00)=""/4096, 0x1000}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@rand_addr, @in6=@local}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@remote, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000480)=0xe8) getgid() lstat(&(0x7f0000000500)='./file0\x00', &(0x7f00000008c0)) getresgid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[], 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001f40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@dev, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002300)={@dev, @local}, &(0x7f0000002340)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'veth1_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002400)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'bpq0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003fc0)={@remote}, &(0x7f0000004000)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004080)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000040c0)={@loopback}, &(0x7f0000004100)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000004200), &(0x7f0000004240)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000042c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004380)={{{@in6, @in6=@ipv4={[], [], @remote}}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000004480)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000044c0)={@loopback}, &(0x7f0000004500)=0x14) 03:35:18 executing program 1: keyctl$set_reqkey_keyring(0xf, 0xfffffffffffffffe) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) timerfd_create(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000980)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0), &(0x7f0000000c00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'veth1_to_bridge\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) syz_execute_func(&(0x7f0000000200)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:35:18 executing program 4: stat(&(0x7f00000001c0)='./file1\x00', &(0x7f00000013c0)) getegid() stat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) setgroups(0x0, &(0x7f0000001500)) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000003380)) recvmmsg(0xffffffffffffffff, &(0x7f0000003240), 0x0, 0x0, &(0x7f00000033c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000003480), &(0x7f00000044c0)=0xfffffffffffffedd) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getpgrp(0xffffffffffffffff) getpgid(0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000080)) clock_getres(0x0, &(0x7f0000001280)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f00000012c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:18 executing program 2: epoll_create(0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000140)='wlan1\x00'}, 0x30) getpgid(0x0) timer_create(0x0, &(0x7f00000001c0), &(0x7f0000000280)) timer_getoverrun(0x0) readlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)=""/110, 0xff5f) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="42805da0cd0fef69dcce73fe19a9380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fb660ffafa44dbe271fb26f00fbb9500000000") ioprio_get$pid(0x0, 0x0) dup(0xffffffffffffffff) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000340)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:35:18 executing program 0: epoll_create(0x1000) mmap(&(0x7f0000074000/0xf000)=nil, 0xf000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @multicast2}, &(0x7f00000000c0)=0xc) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000240), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_vs\x00') ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000300)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0124fefeddc0f01eea873fe1903fafa0f38211af3f081768cc8000000c4a3e90e9a000000008567f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:35:18 executing program 5: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) 03:35:19 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000a80)='system.posix_acl_access\x00'}, 0x30) syz_open_procfs(0x0, &(0x7f0000000b00)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") syz_genetlink_get_family_id$team(&(0x7f0000001cc0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@loopback, @local}, &(0x7f0000000680)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'bpq0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'lo\x00'}) recvmsg(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000000740)=@hci, 0x80, &(0x7f0000000b80), 0x0, &(0x7f0000000c00)=""/4096, 0x1000}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@rand_addr, @in6=@local}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@remote, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000480)=0xe8) getgid() lstat(&(0x7f0000000500)='./file0\x00', &(0x7f00000008c0)) getresgid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[], 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001f40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@dev, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002300)={@dev, @local}, &(0x7f0000002340)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'veth1_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002400)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'bpq0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003fc0)={@remote}, &(0x7f0000004000)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004080)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000040c0)={@loopback}, &(0x7f0000004100)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000004200), &(0x7f0000004240)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000042c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004380)={{{@in6, @in6=@ipv4={[], [], @remote}}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000004480)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000044c0)={@loopback}, &(0x7f0000004500)=0x14) 03:35:19 executing program 1: keyctl$set_reqkey_keyring(0xf, 0xfffffffffffffffe) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) timerfd_create(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000980)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0), &(0x7f0000000c00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'veth1_to_bridge\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) syz_execute_func(&(0x7f0000000200)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:35:19 executing program 4: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000540)={'team0\x00'}) keyctl$set_reqkey_keyring(0x5, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000240)) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000180)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000340)={{0x77359400}, {0x77359400}}, &(0x7f0000000380)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f00000001c0)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) gettid() syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:35:19 executing program 2: epoll_create(0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000140)='wlan1\x00'}, 0x30) getpgid(0x0) timer_create(0x0, &(0x7f00000001c0), &(0x7f0000000280)) timer_getoverrun(0x0) readlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)=""/110, 0xff5f) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="42805da0cd0fef69dcce73fe19a9380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fb660ffafa44dbe271fb26f00fbb9500000000") ioprio_get$pid(0x0, 0x0) dup(0xffffffffffffffff) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000340)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:35:19 executing program 0: epoll_create(0x1000) mmap(&(0x7f0000074000/0xf000)=nil, 0xf000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @multicast2}, &(0x7f00000000c0)=0xc) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000240), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_vs\x00') ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000300)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0124fefeddc0f01eea873fe1903fafa0f38211af3f081768cc8000000c4a3e90e9a000000008567f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:35:19 executing program 5: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) 03:35:20 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000a80)='system.posix_acl_access\x00'}, 0x30) syz_open_procfs(0x0, &(0x7f0000000b00)="6e65742f6669625f7472696500399e8f14bd44445159b3f991735be73fe004dd8ebfe75c0b3a52157de7aea3dc585d44e4cf6f634de2b38ec1574f207ea0b744be7ac28aeeae416d7e9c8f7eb0b907220d0b0e934b") syz_genetlink_get_family_id$team(&(0x7f0000001cc0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@loopback, @local}, &(0x7f0000000680)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'bpq0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'lo\x00'}) recvmsg(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000000740)=@hci, 0x80, &(0x7f0000000b80), 0x0, &(0x7f0000000c00)=""/4096, 0x1000}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@rand_addr, @in6=@local}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@remote, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000480)=0xe8) getgid() lstat(&(0x7f0000000500)='./file0\x00', &(0x7f00000008c0)) getresgid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[], 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@dev, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001f40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002040)={{{@in6=@dev, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002300)={@dev, @local}, &(0x7f0000002340)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'veth1_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002400)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000025c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'bpq0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003fc0)={@remote}, &(0x7f0000004000)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004080)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000040c0)={@loopback}, &(0x7f0000004100)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000004200), &(0x7f0000004240)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000042c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004380)={{{@in6, @in6=@ipv4={[], [], @remote}}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000004480)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000044c0)={@loopback}, &(0x7f0000004500)=0x14) 03:35:20 executing program 1: keyctl$set_reqkey_keyring(0xf, 0xfffffffffffffffe) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) timerfd_create(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000980)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0), &(0x7f0000000c00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'veth1_to_bridge\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) syz_execute_func(&(0x7f0000000200)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:35:20 executing program 4: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000540)={'team0\x00'}) keyctl$set_reqkey_keyring(0x5, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000240)) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000180)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000340)={{0x77359400}, {0x77359400}}, &(0x7f0000000380)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f00000001c0)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) gettid() syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:35:20 executing program 2: epoll_create(0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000140)='wlan1\x00'}, 0x30) getpgid(0x0) timer_create(0x0, &(0x7f00000001c0), &(0x7f0000000280)) timer_getoverrun(0x0) readlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)=""/110, 0xff5f) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="42805da0cd0fef69dcce73fe19a9380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fb660ffafa44dbe271fb26f00fbb9500000000") ioprio_get$pid(0x0, 0x0) dup(0xffffffffffffffff) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000340)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:35:20 executing program 0: epoll_create(0x1000) mmap(&(0x7f0000074000/0xf000)=nil, 0xf000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @multicast2}, &(0x7f00000000c0)=0xc) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000240), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_vs\x00') ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000300)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0124fefeddc0f01eea873fe1903fafa0f38211af3f081768cc8000000c4a3e90e9a000000008567f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:35:20 executing program 5: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) 03:35:20 executing program 3: clock_settime(0xffffffffffffffff, 0xfffffffffffffffd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'veth1_to_bridge\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@loopback, @in6=@local}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @local, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000000700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003180)={'vcan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000006700), 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:35:21 executing program 1: keyctl$set_reqkey_keyring(0xf, 0xfffffffffffffffe) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) timerfd_create(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000980)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000bc0), &(0x7f0000000c00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'veth1_to_bridge\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14, 0x0) syz_execute_func(&(0x7f0000000200)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:35:21 executing program 4: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000540)={'team0\x00'}) keyctl$set_reqkey_keyring(0x5, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000240)) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000180)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000340)={{0x77359400}, {0x77359400}}, &(0x7f0000000380)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f00000001c0)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) gettid() syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:35:21 executing program 2: epoll_create(0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000140)='wlan1\x00'}, 0x30) getpgid(0x0) timer_create(0x0, &(0x7f00000001c0), &(0x7f0000000280)) timer_getoverrun(0x0) readlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)=""/110, 0xff5f) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="42805da0cd0fef69dcce73fe19a9380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fb660ffafa44dbe271fb26f00fbb9500000000") ioprio_get$pid(0x0, 0x0) dup(0xffffffffffffffff) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000340)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:35:21 executing program 0: epoll_create(0x1000) mmap(&(0x7f0000074000/0xf000)=nil, 0xf000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @multicast2}, &(0x7f00000000c0)=0xc) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000240), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_vs\x00') ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000300)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0124fefeddc0f01eea873fe1903fafa0f38211af3f081768cc8000000c4a3e90e9a000000008567f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:35:21 executing program 5: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) 03:35:21 executing program 3: clock_settime(0xffffffffffffffff, 0xfffffffffffffffd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'veth1_to_bridge\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@loopback, @in6=@local}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @local, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000000700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003180)={'vcan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000006700), 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:35:22 executing program 1: setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000500), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000001c0)=ANY=[]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f00000000c0)='\x00', 0x0) mount(&(0x7f0000000740)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) getgroups(0x0, &(0x7f0000000a40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003bc0), &(0x7f0000003c00)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003c40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./file0\x00', &(0x7f0000004b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004bc0)) stat(&(0x7f0000004c00)='./file0\x00', &(0x7f0000004c40)) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f00000061c0)) gettid() getresgid(&(0x7f00000063c0), &(0x7f0000006400), &(0x7f0000006440)) getpgrp(0x0) getresgid(&(0x7f0000006480), &(0x7f00000064c0), &(0x7f0000006500)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007980), &(0x7f00000079c0)=0xc) getegid() getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da01245cf0f01eece73fe470f006f92380f8ac469df1af3f081768cc8000601c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541f20f38f01a0f2e1ad6fb0703") 03:35:22 executing program 4: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000540)={'team0\x00'}) keyctl$set_reqkey_keyring(0x5, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000240)) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000180)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000340)={{0x77359400}, {0x77359400}}, &(0x7f0000000380)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f00000001c0)=ANY=[], &(0x7f00000003c0)="5129953a74656d306b657972696e672e262e637075736574656d307b287365637572697479280873656375726974792f6d643573756d2e736563757269747900", 0x40, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) gettid() syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:35:22 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x88, 0x67, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 03:35:22 executing program 0: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000640), 0x0) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000940)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000900)}, 0x20) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0), &(0x7f0000000340)=0x68) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) request_key(&(0x7f00000004c0)='dns_resolver\x00', &(0x7f0000000740), &(0x7f0000000780)='/dev/full\x00', 0xfffffffffffffff8) clock_getres(0x0, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x12, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) setresgid(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000540)={0xb, 0x10, 0xfa00, {&(0x7f0000000480)}}, 0x18) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000002c0)) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") 03:35:22 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x88, 0x67, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 03:35:22 executing program 5: prctl$seccomp(0x7, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000700)={0x18}, 0x18) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000900), 0xc, &(0x7f0000000b40)={&(0x7f0000000980)=ANY=[]}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000340)) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getuid() lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@loopback, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000200), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:22 executing program 3: clock_settime(0xffffffffffffffff, 0xfffffffffffffffd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'veth1_to_bridge\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@loopback, @in6=@local}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @local, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000000700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003180)={'vcan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000006700), 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:35:22 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x88, 0x67, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 03:35:22 executing program 1: setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000500), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000001c0)=ANY=[]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f00000000c0)='\x00', 0x0) mount(&(0x7f0000000740)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) getgroups(0x0, &(0x7f0000000a40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003bc0), &(0x7f0000003c00)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003c40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./file0\x00', &(0x7f0000004b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004bc0)) stat(&(0x7f0000004c00)='./file0\x00', &(0x7f0000004c40)) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f00000061c0)) gettid() getresgid(&(0x7f00000063c0), &(0x7f0000006400), &(0x7f0000006440)) getpgrp(0x0) getresgid(&(0x7f0000006480), &(0x7f00000064c0), &(0x7f0000006500)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007980), &(0x7f00000079c0)=0xc) getegid() getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da01245cf0f01eece73fe470f006f92380f8ac469df1af3f081768cc8000601c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541f20f38f01a0f2e1ad6fb0703") 03:35:23 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x88, 0x67, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 03:35:23 executing program 4: select(0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100)) 03:35:23 executing program 4: select(0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100)) 03:35:23 executing program 2: syz_emit_ethernet(0xfdef, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x5, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local={0xac, 0x70}, @dev, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000100)) 03:35:23 executing program 2: syz_emit_ethernet(0xfdef, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x5, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local={0xac, 0x70}, @dev, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000100)) 03:35:23 executing program 4: select(0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100)) 03:35:23 executing program 0: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000640), 0x0) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000940)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000900)}, 0x20) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0), &(0x7f0000000340)=0x68) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) request_key(&(0x7f00000004c0)='dns_resolver\x00', &(0x7f0000000740), &(0x7f0000000780)='/dev/full\x00', 0xfffffffffffffff8) clock_getres(0x0, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x12, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) setresgid(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000540)={0xb, 0x10, 0xfa00, {&(0x7f0000000480)}}, 0x18) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000002c0)) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") 03:35:23 executing program 2: syz_emit_ethernet(0xfdef, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x5, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local={0xac, 0x70}, @dev, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000100)) 03:35:23 executing program 5: prctl$seccomp(0x7, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000700)={0x18}, 0x18) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000900), 0xc, &(0x7f0000000b40)={&(0x7f0000000980)=ANY=[]}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000340)) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getuid() lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@loopback, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000200), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:23 executing program 3: clock_settime(0xffffffffffffffff, 0xfffffffffffffffd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'veth1_to_bridge\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@loopback, @in6=@local}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @local, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000000700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001a80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003180)={'vcan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000006700), 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:35:23 executing program 4: select(0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100)) 03:35:23 executing program 1: setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000500), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000001c0)=ANY=[]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f00000000c0)='\x00', 0x0) mount(&(0x7f0000000740)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) getgroups(0x0, &(0x7f0000000a40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003bc0), &(0x7f0000003c00)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003c40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./file0\x00', &(0x7f0000004b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004bc0)) stat(&(0x7f0000004c00)='./file0\x00', &(0x7f0000004c40)) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f00000061c0)) gettid() getresgid(&(0x7f00000063c0), &(0x7f0000006400), &(0x7f0000006440)) getpgrp(0x0) getresgid(&(0x7f0000006480), &(0x7f00000064c0), &(0x7f0000006500)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007980), &(0x7f00000079c0)=0xc) getegid() getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da01245cf0f01eece73fe470f006f92380f8ac469df1af3f081768cc8000601c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541f20f38f01a0f2e1ad6fb0703") 03:35:23 executing program 2: syz_emit_ethernet(0xfdef, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x5, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local={0xac, 0x70}, @dev, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000100)) 03:35:23 executing program 4: clock_gettime(0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000580)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f0000004240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000c40)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x50, &(0x7f0000000280)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='system]\x00'}, 0x30) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[]) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@multicast1, @in=@rand_addr}}, {{}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000980)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000a00)={0x0, @remote, @local}, &(0x7f0000000a40)=0xc) clock_gettime(0x0, &(0x7f0000002840)) recvmmsg(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0, &(0x7f0000002880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in=@loopback, @in6=@mcast2}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000002a40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002a80)={@dev}, &(0x7f0000002ac0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003e40)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000003f40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f80)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000004080)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000040c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004100)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000099c0), 0x0, 0x0, &(0x7f0000009b40)={0x77359400}) 03:35:24 executing program 2: getresuid(&(0x7f00000000c0), &(0x7f0000000380), &(0x7f0000000500)) clock_gettime(0x0, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @broadcast}, &(0x7f00000005c0)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) gettid() getrusage(0x0, &(0x7f0000000740)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:24 executing program 0: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000640), 0x0) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000940)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000900)}, 0x20) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0), &(0x7f0000000340)=0x68) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) request_key(&(0x7f00000004c0)='dns_resolver\x00', &(0x7f0000000740), &(0x7f0000000780)='/dev/full\x00', 0xfffffffffffffff8) clock_getres(0x0, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x12, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) setresgid(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000540)={0xb, 0x10, 0xfa00, {&(0x7f0000000480)}}, 0x18) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000002c0)) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") 03:35:24 executing program 5: prctl$seccomp(0x7, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000700)={0x18}, 0x18) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000900), 0xc, &(0x7f0000000b40)={&(0x7f0000000980)=ANY=[]}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000340)) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getuid() lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@loopback, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000200), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:24 executing program 3: clock_gettime(0x0, &(0x7f0000000180)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000780), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x77359400}, {0x77359400}}, &(0x7f0000000580)) semget$private(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000440)=0xe8) pipe2(&(0x7f00000004c0), 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000006c0), 0x10) getgroups(0x0, &(0x7f0000000480)) fstat(0xffffffffffffff9c, &(0x7f0000000780)) fstat(0xffffffffffffff9c, &(0x7f0000000800)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000880)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f00000009c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000ac0)=0x98) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000900)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000080)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) getpid() ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240)={@dev}, &(0x7f0000000400)=0x14) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 03:35:24 executing program 1: setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000500), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000001c0)=ANY=[]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f00000000c0)='\x00', 0x0) mount(&(0x7f0000000740)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) getgroups(0x0, &(0x7f0000000a40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003bc0), &(0x7f0000003c00)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003c40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./file0\x00', &(0x7f0000004b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004bc0)) stat(&(0x7f0000004c00)='./file0\x00', &(0x7f0000004c40)) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f00000061c0)) gettid() getresgid(&(0x7f00000063c0), &(0x7f0000006400), &(0x7f0000006440)) getpgrp(0x0) getresgid(&(0x7f0000006480), &(0x7f00000064c0), &(0x7f0000006500)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007980), &(0x7f00000079c0)=0xc) getegid() getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da01245cf0f01eece73fe470f006f92380f8ac469df1af3f081768cc8000601c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541f20f38f01a0f2e1ad6fb0703") 03:35:24 executing program 4: clock_gettime(0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000580)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f0000004240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000c40)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x50, &(0x7f0000000280)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='system]\x00'}, 0x30) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[]) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@multicast1, @in=@rand_addr}}, {{}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000980)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000a00)={0x0, @remote, @local}, &(0x7f0000000a40)=0xc) clock_gettime(0x0, &(0x7f0000002840)) recvmmsg(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0, &(0x7f0000002880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in=@loopback, @in6=@mcast2}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000002a40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002a80)={@dev}, &(0x7f0000002ac0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003e40)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000003f40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f80)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000004080)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000040c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004100)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000099c0), 0x0, 0x0, &(0x7f0000009b40)={0x77359400}) 03:35:24 executing program 2: getresuid(&(0x7f00000000c0), &(0x7f0000000380), &(0x7f0000000500)) clock_gettime(0x0, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @broadcast}, &(0x7f00000005c0)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) gettid() getrusage(0x0, &(0x7f0000000740)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:25 executing program 0: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000640), 0x0) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000940)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000900)}, 0x20) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000002c0), &(0x7f0000000340)=0x68) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) request_key(&(0x7f00000004c0)='dns_resolver\x00', &(0x7f0000000740), &(0x7f0000000780)='/dev/full\x00', 0xfffffffffffffff8) clock_getres(0x0, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x12, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) setresgid(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000540)={0xb, 0x10, 0xfa00, {&(0x7f0000000480)}}, 0x18) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000002c0)) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") 03:35:25 executing program 5: prctl$seccomp(0x7, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000700)={0x18}, 0x18) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000900), 0xc, &(0x7f0000000b40)={&(0x7f0000000980)=ANY=[]}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000340)) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getuid() lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@loopback, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000200), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:25 executing program 3: clock_gettime(0x0, &(0x7f0000000180)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000780), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x77359400}, {0x77359400}}, &(0x7f0000000580)) semget$private(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000440)=0xe8) pipe2(&(0x7f00000004c0), 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000006c0), 0x10) getgroups(0x0, &(0x7f0000000480)) fstat(0xffffffffffffff9c, &(0x7f0000000780)) fstat(0xffffffffffffff9c, &(0x7f0000000800)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000880)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f00000009c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000ac0)=0x98) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000900)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000080)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) getpid() ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240)={@dev}, &(0x7f0000000400)=0x14) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 03:35:25 executing program 4: clock_gettime(0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000580)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f0000004240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000c40)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x50, &(0x7f0000000280)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='system]\x00'}, 0x30) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[]) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@multicast1, @in=@rand_addr}}, {{}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000980)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000a00)={0x0, @remote, @local}, &(0x7f0000000a40)=0xc) clock_gettime(0x0, &(0x7f0000002840)) recvmmsg(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0, &(0x7f0000002880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in=@loopback, @in6=@mcast2}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000002a40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002a80)={@dev}, &(0x7f0000002ac0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003e40)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000003f40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f80)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000004080)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000040c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004100)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000099c0), 0x0, 0x0, &(0x7f0000009b40)={0x77359400}) 03:35:25 executing program 1: mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:25 executing program 2: getresuid(&(0x7f00000000c0), &(0x7f0000000380), &(0x7f0000000500)) clock_gettime(0x0, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @broadcast}, &(0x7f00000005c0)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) gettid() getrusage(0x0, &(0x7f0000000740)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000340)}, 0x20) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000140)={'bridge0\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:26 executing program 5: clock_gettime(0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000580)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f0000004240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000c40)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x50, &(0x7f0000000280)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='system]\x00'}, 0x30) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[]) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@multicast1, @in=@rand_addr}}, {{}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000980)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000a00)={0x0, @remote, @local}, &(0x7f0000000a40)=0xc) clock_gettime(0x0, &(0x7f0000002840)) recvmmsg(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0, &(0x7f0000002880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in=@loopback, @in6=@mcast2}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000002a40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002a80)={@dev}, &(0x7f0000002ac0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002b40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003e40)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000003f40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f80)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000004080)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000040c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004100)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000099c0), 0x0, 0x0, &(0x7f0000009b40)={0x77359400}) getsockname$packet(0xffffffffffffffff, &(0x7f0000009b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000009bc0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000009c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009c40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009c80)={@loopback, @rand_addr}, &(0x7f0000009cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000009ec0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009f00)={'team0\x00'}) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000a100)={&(0x7f0000009f40)=@hci, 0x80, &(0x7f000000a080), 0x0, &(0x7f000000a0c0)=""/7, 0x7}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000008c0), &(0x7f0000000840)=0xffffffffffffff46) 03:35:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000340)}, 0x20) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000140)={'bridge0\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:26 executing program 3: clock_gettime(0x0, &(0x7f0000000180)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000780), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x77359400}, {0x77359400}}, &(0x7f0000000580)) semget$private(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000440)=0xe8) pipe2(&(0x7f00000004c0), 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000006c0), 0x10) getgroups(0x0, &(0x7f0000000480)) fstat(0xffffffffffffff9c, &(0x7f0000000780)) fstat(0xffffffffffffff9c, &(0x7f0000000800)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000880)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f00000009c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000ac0)=0x98) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000900)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000080)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) getpid() ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240)={@dev}, &(0x7f0000000400)=0x14) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 03:35:26 executing program 1: mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:26 executing program 4: clock_gettime(0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000580)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f0000004240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000c40)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x50, &(0x7f0000000280)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='system]\x00'}, 0x30) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[]) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@multicast1, @in=@rand_addr}}, {{}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000980)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000a00)={0x0, @remote, @local}, &(0x7f0000000a40)=0xc) clock_gettime(0x0, &(0x7f0000002840)) recvmmsg(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0, &(0x7f0000002880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in=@loopback, @in6=@mcast2}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000002a40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002a80)={@dev}, &(0x7f0000002ac0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003e40)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000003f40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f80)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000004080)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000040c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004100)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000099c0), 0x0, 0x0, &(0x7f0000009b40)={0x77359400}) 03:35:26 executing program 2: getresuid(&(0x7f00000000c0), &(0x7f0000000380), &(0x7f0000000500)) clock_gettime(0x0, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @broadcast}, &(0x7f00000005c0)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) gettid() getrusage(0x0, &(0x7f0000000740)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000340)}, 0x20) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000140)={'bridge0\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x83, 0x8, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000340)}, 0x20) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000140)={'bridge0\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:27 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000380)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000400), 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), 0x0, 0x0, 0xfffffffffffffffd) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:27 executing program 5: clock_gettime(0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000580)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f0000004240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000c40)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x50, &(0x7f0000000280)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='system]\x00'}, 0x30) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[]) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@multicast1, @in=@rand_addr}}, {{}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000980)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000a00)={0x0, @remote, @local}, &(0x7f0000000a40)=0xc) clock_gettime(0x0, &(0x7f0000002840)) recvmmsg(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0, &(0x7f0000002880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in=@loopback, @in6=@mcast2}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000002a40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002a80)={@dev}, &(0x7f0000002ac0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002b40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003e40)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000003f40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f80)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000004080)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000040c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004100)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000099c0), 0x0, 0x0, &(0x7f0000009b40)={0x77359400}) getsockname$packet(0xffffffffffffffff, &(0x7f0000009b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000009bc0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000009c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009c40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009c80)={@loopback, @rand_addr}, &(0x7f0000009cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000009ec0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009f00)={'team0\x00'}) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000a100)={&(0x7f0000009f40)=@hci, 0x80, &(0x7f000000a080), 0x0, &(0x7f000000a0c0)=""/7, 0x7}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000008c0), &(0x7f0000000840)=0xffffffffffffff46) 03:35:27 executing program 3: clock_gettime(0x0, &(0x7f0000000180)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000780), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x77359400}, {0x77359400}}, &(0x7f0000000580)) semget$private(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000440)=0xe8) pipe2(&(0x7f00000004c0), 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000006c0), 0x10) getgroups(0x0, &(0x7f0000000480)) fstat(0xffffffffffffff9c, &(0x7f0000000780)) fstat(0xffffffffffffff9c, &(0x7f0000000800)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000880)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480), &(0x7f00000009c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000ac0)=0x98) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000900)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000080)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) getpid() ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240)={@dev}, &(0x7f0000000400)=0x14) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 03:35:27 executing program 1: mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a01002356ba602dff05000b", 0x10) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000003f40)=""/190, 0xbe}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x228, &(0x7f00000061c0)=""/240, 0xf0}, 0x1000000}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 03:35:27 executing program 2: getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a01002356ba602dff05000b", 0x10) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000003f40)=""/190, 0xbe}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x228, &(0x7f00000061c0)=""/240, 0xf0}, 0x1000000}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 03:35:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a01002356ba602dff05000b", 0x10) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000003f40)=""/190, 0xbe}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x228, &(0x7f00000061c0)=""/240, 0xf0}, 0x1000000}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 03:35:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a01002356ba602dff05000b", 0x10) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000003f40)=""/190, 0xbe}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x228, &(0x7f00000061c0)=""/240, 0xf0}, 0x1000000}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 03:35:28 executing program 4: r0 = socket$inet6(0xa, 0x3000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendfile(r3, r2, &(0x7f0000000200), 0x3) 03:35:28 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000380)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000400), 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), 0x0, 0x0, 0xfffffffffffffffd) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:28 executing program 4: r0 = socket$inet6(0xa, 0x3000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendfile(r3, r2, &(0x7f0000000200), 0x3) 03:35:28 executing program 5: clock_gettime(0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000580)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f0000004240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000c40)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x50, &(0x7f0000000280)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='system]\x00'}, 0x30) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[]) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@multicast1, @in=@rand_addr}}, {{}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000980)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000a00)={0x0, @remote, @local}, &(0x7f0000000a40)=0xc) clock_gettime(0x0, &(0x7f0000002840)) recvmmsg(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0, &(0x7f0000002880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in=@loopback, @in6=@mcast2}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000002a40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002a80)={@dev}, &(0x7f0000002ac0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002b40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003e40)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000003f40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f80)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000004080)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000040c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004100)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000099c0), 0x0, 0x0, &(0x7f0000009b40)={0x77359400}) getsockname$packet(0xffffffffffffffff, &(0x7f0000009b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000009bc0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000009c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009c40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009c80)={@loopback, @rand_addr}, &(0x7f0000009cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000009ec0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009f00)={'team0\x00'}) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000a100)={&(0x7f0000009f40)=@hci, 0x80, &(0x7f000000a080), 0x0, &(0x7f000000a0c0)=""/7, 0x7}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000008c0), &(0x7f0000000840)=0xffffffffffffff46) 03:35:28 executing program 3: add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0), &(0x7f0000000500)="01", 0x1, 0xfffffffffffffffb) memfd_create(&(0x7f0000000400)="7be82c2d6367726f757000", 0x0) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0/file0\x00', 0x0, 0x0) dup(0xffffffffffffff9c) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000002c0)) add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240), &(0x7f0000000640), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000040)="7573657200b411497917edc5a66d63520f08987a51a64ba92c2e55dba26766153a180ddd8f8870e403539c408f23a31c615854ce23f0ec", &(0x7f0000000300), &(0x7f0000000280)="2d32ff0fc551b090437700", 0x0) chroot(&(0x7f0000000380)='./file0\x00') ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000600)) rt_sigpending(&(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") request_key(&(0x7f0000000bc0)='cifs.spnego\x00', &(0x7f0000000700), &(0x7f0000000740)='.#vmnet1]ppp1keyring\x00', 0xfffffffffffffffc) clock_gettime(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000a00)) clock_gettime(0x0, &(0x7f0000000a40)) clock_gettime(0x0, &(0x7f0000000a80)) write$evdev(0xffffffffffffffff, &(0x7f0000000ac0), 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000440)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000880)=0x1c) connect(0xffffffffffffffff, &(0x7f0000000940)=@in={0x2, 0x0, @dev}, 0x80) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000c40)="428055a08e6969ef69dc00d990c841ff0fc4c3397c2a06c4e2a0f31b40a5c19086d9f28fc9c48119e3d34175455d0f2e1a36f33e0b170d64ac1e5d31a3b786e2989f7f") 03:35:28 executing program 4: r0 = socket$inet6(0xa, 0x3000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendfile(r3, r2, &(0x7f0000000200), 0x3) 03:35:28 executing program 1: mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:28 executing program 4: r0 = socket$inet6(0xa, 0x3000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendfile(r3, r2, &(0x7f0000000200), 0x3) 03:35:28 executing program 2: getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:28 executing program 3: add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0), &(0x7f0000000500)="01", 0x1, 0xfffffffffffffffb) memfd_create(&(0x7f0000000400)="7be82c2d6367726f757000", 0x0) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0/file0\x00', 0x0, 0x0) dup(0xffffffffffffff9c) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000002c0)) add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240), &(0x7f0000000640), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000040)="7573657200b411497917edc5a66d63520f08987a51a64ba92c2e55dba26766153a180ddd8f8870e403539c408f23a31c615854ce23f0ec", &(0x7f0000000300), &(0x7f0000000280)="2d32ff0fc551b090437700", 0x0) chroot(&(0x7f0000000380)='./file0\x00') ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000600)) rt_sigpending(&(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") request_key(&(0x7f0000000bc0)='cifs.spnego\x00', &(0x7f0000000700), &(0x7f0000000740)='.#vmnet1]ppp1keyring\x00', 0xfffffffffffffffc) clock_gettime(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000a00)) clock_gettime(0x0, &(0x7f0000000a40)) clock_gettime(0x0, &(0x7f0000000a80)) write$evdev(0xffffffffffffffff, &(0x7f0000000ac0), 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000440)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000880)=0x1c) connect(0xffffffffffffffff, &(0x7f0000000940)=@in={0x2, 0x0, @dev}, 0x80) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000c40)="428055a08e6969ef69dc00d990c841ff0fc4c3397c2a06c4e2a0f31b40a5c19086d9f28fc9c48119e3d34175455d0f2e1a36f33e0b170d64ac1e5d31a3b786e2989f7f") 03:35:28 executing program 4: keyctl$setperm(0x10, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001600)={@dev}, &(0x7f0000001640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000016c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in, @in=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000018c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000002440), 0x0, 0x0, &(0x7f0000002500)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002540)={0x0, @multicast2, @loopback}, &(0x7f0000002580)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002600)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002640)={{{@in=@dev, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002740)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002780)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000027c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @broadcast}}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002900)={{{@in6=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000002a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000002a40)={'vcan0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002ac0)=0x14) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), 0x4) accept$packet(0xffffffffffffffff, &(0x7f0000002b00), &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002b80), &(0x7f0000002bc0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002c00)={0x0, @empty, @multicast1}, &(0x7f0000002c40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f00000000c0), 0xc, &(0x7f0000003340)={&(0x7f0000002d00)={0x14}, 0x14}}, 0x0) 03:35:28 executing program 3: add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0), &(0x7f0000000500)="01", 0x1, 0xfffffffffffffffb) memfd_create(&(0x7f0000000400)="7be82c2d6367726f757000", 0x0) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0/file0\x00', 0x0, 0x0) dup(0xffffffffffffff9c) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000002c0)) add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240), &(0x7f0000000640), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000040)="7573657200b411497917edc5a66d63520f08987a51a64ba92c2e55dba26766153a180ddd8f8870e403539c408f23a31c615854ce23f0ec", &(0x7f0000000300), &(0x7f0000000280)="2d32ff0fc551b090437700", 0x0) chroot(&(0x7f0000000380)='./file0\x00') ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000600)) rt_sigpending(&(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") request_key(&(0x7f0000000bc0)='cifs.spnego\x00', &(0x7f0000000700), &(0x7f0000000740)='.#vmnet1]ppp1keyring\x00', 0xfffffffffffffffc) clock_gettime(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000a00)) clock_gettime(0x0, &(0x7f0000000a40)) clock_gettime(0x0, &(0x7f0000000a80)) write$evdev(0xffffffffffffffff, &(0x7f0000000ac0), 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000440)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000880)=0x1c) connect(0xffffffffffffffff, &(0x7f0000000940)=@in={0x2, 0x0, @dev}, 0x80) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000c40)="428055a08e6969ef69dc00d990c841ff0fc4c3397c2a06c4e2a0f31b40a5c19086d9f28fc9c48119e3d34175455d0f2e1a36f33e0b170d64ac1e5d31a3b786e2989f7f") 03:35:29 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000380)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000400), 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), 0x0, 0x0, 0xfffffffffffffffd) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:29 executing program 3: add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0), &(0x7f0000000500)="01", 0x1, 0xfffffffffffffffb) memfd_create(&(0x7f0000000400)="7be82c2d6367726f757000", 0x0) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0/file0\x00', 0x0, 0x0) dup(0xffffffffffffff9c) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000002c0)) add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240), &(0x7f0000000640), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000040)="7573657200b411497917edc5a66d63520f08987a51a64ba92c2e55dba26766153a180ddd8f8870e403539c408f23a31c615854ce23f0ec", &(0x7f0000000300), &(0x7f0000000280)="2d32ff0fc551b090437700", 0x0) chroot(&(0x7f0000000380)='./file0\x00') ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000600)) rt_sigpending(&(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") request_key(&(0x7f0000000bc0)='cifs.spnego\x00', &(0x7f0000000700), &(0x7f0000000740)='.#vmnet1]ppp1keyring\x00', 0xfffffffffffffffc) clock_gettime(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000a00)) clock_gettime(0x0, &(0x7f0000000a40)) clock_gettime(0x0, &(0x7f0000000a80)) write$evdev(0xffffffffffffffff, &(0x7f0000000ac0), 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000440)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000880)=0x1c) connect(0xffffffffffffffff, &(0x7f0000000940)=@in={0x2, 0x0, @dev}, 0x80) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000c40)="428055a08e6969ef69dc00d990c841ff0fc4c3397c2a06c4e2a0f31b40a5c19086d9f28fc9c48119e3d34175455d0f2e1a36f33e0b170d64ac1e5d31a3b786e2989f7f") 03:35:29 executing program 5: clock_gettime(0x8, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000580)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f0000004240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{}, 'syz0\x00'}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000c40)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x50, &(0x7f0000000280)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='system]\x00'}, 0x30) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[]) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@multicast1, @in=@rand_addr}}, {{}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000980)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000a00)={0x0, @remote, @local}, &(0x7f0000000a40)=0xc) clock_gettime(0x0, &(0x7f0000002840)) recvmmsg(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0, &(0x7f0000002880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002940)={{{@in=@loopback, @in6=@mcast2}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000002a40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002a80)={@dev}, &(0x7f0000002ac0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002b40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003e40)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000003f40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f80)={{{@in, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000004080)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000040c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004100)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000099c0), 0x0, 0x0, &(0x7f0000009b40)={0x77359400}) getsockname$packet(0xffffffffffffffff, &(0x7f0000009b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000009bc0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000009c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009c40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009c80)={@loopback, @rand_addr}, &(0x7f0000009cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000009ec0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009f00)={'team0\x00'}) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000a100)={&(0x7f0000009f40)=@hci, 0x80, &(0x7f000000a080), 0x0, &(0x7f000000a0c0)=""/7, 0x7}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000008c0), &(0x7f0000000840)=0xffffffffffffff46) 03:35:29 executing program 3: prctl$intptr(0x400000000018, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000440)=""/177) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:29 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) epoll_create1(0x0) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:29 executing program 2: getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:29 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) epoll_create1(0x0) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:29 executing program 4: keyctl$setperm(0x10, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001600)={@dev}, &(0x7f0000001640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000016c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in, @in=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000018c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000002440), 0x0, 0x0, &(0x7f0000002500)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002540)={0x0, @multicast2, @loopback}, &(0x7f0000002580)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002600)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002640)={{{@in=@dev, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002740)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002780)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000027c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @broadcast}}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002900)={{{@in6=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000002a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000002a40)={'vcan0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002ac0)=0x14) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), 0x4) accept$packet(0xffffffffffffffff, &(0x7f0000002b00), &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002b80), &(0x7f0000002bc0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002c00)={0x0, @empty, @multicast1}, &(0x7f0000002c40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f00000000c0), 0xc, &(0x7f0000003340)={&(0x7f0000002d00)={0x14}, 0x14}}, 0x0) 03:35:30 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000380)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000400), 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), 0x0, 0x0, 0xfffffffffffffffd) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:30 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) epoll_create1(0x0) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:30 executing program 5: syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) request_key(&(0x7f0000000540)='syzkaller\x00', &(0x7f0000000580), &(0x7f00000005c0)='-keyring#user.\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000600)='asymmetric\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000780), &(0x7f00000006c0), 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000b00)) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000700), 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000006c0)=""/178) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380), &(0x7f0000000040), 0x0, 0xfffffffffffffffe) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000008c0)=""/249) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f00000007c0)=""/3) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'syzkaller1\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000d40)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000e00)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e40)={{{@in=@broadcast, @in=@local}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000f40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003d80)={@mcast2}, &(0x7f0000003dc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003e00)={{{@in=@broadcast, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000003f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f40)={{{@in6=@mcast1, @in=@local}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000004040)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f00000043c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004400)={{{@in=@multicast2, @in=@remote}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000004500)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000004540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004580)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000009ec0)={0x0, @remote, @multicast1}, &(0x7f0000009f00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a080)={'erspan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000b680)={'dummy0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000b700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b740)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b780)={{{@in=@dev, @in6}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f000000b880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000b8c0)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b900)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000b940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b980)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b9c0)={{{@in, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f000000bac0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000c040)={0x0, @multicast2, @local}, &(0x7f000000c080)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c0c0)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f000000d140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000d180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000dd40)={&(0x7f0000000800), 0xc, &(0x7f000000dd00)={&(0x7f000000d1c0)={0x14}, 0x14}}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/llc\x00') memfd_create(&(0x7f00000009c0)='vmnet1eth1\'\x00', 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000200)=@assoc_value, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, &(0x7f00000003c0)=0x90) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:30 executing program 1: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) epoll_create1(0x0) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:30 executing program 3: prctl$intptr(0x400000000018, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000440)=""/177) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:30 executing program 2: getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:30 executing program 1: keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001600)={@dev}, &(0x7f0000001640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000016c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in, @in=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000018c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000002440), 0x0, 0x0, &(0x7f0000002500)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002540)={0x0, @multicast2, @loopback}, &(0x7f0000002580)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002600)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002640)={{{@in=@dev, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002740)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002780)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000027c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @broadcast}}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002900)={{{@in6=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000002a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000002a40)={'vcan0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002ac0)=0x14) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), 0x4) accept$packet(0xffffffffffffffff, &(0x7f0000002b00), &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002b80), &(0x7f0000002bc0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002c00)={0x0, @empty, @multicast1}, &(0x7f0000002c40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f00000000c0), 0xc, &(0x7f0000003340)={&(0x7f0000002d00)={0x14}, 0x14}}, 0x0) 03:35:30 executing program 4: keyctl$setperm(0x10, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001600)={@dev}, &(0x7f0000001640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000016c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in, @in=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000018c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000002440), 0x0, 0x0, &(0x7f0000002500)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002540)={0x0, @multicast2, @loopback}, &(0x7f0000002580)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002600)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002640)={{{@in=@dev, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002740)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002780)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000027c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @broadcast}}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002900)={{{@in6=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000002a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000002a40)={'vcan0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002ac0)=0x14) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), 0x4) accept$packet(0xffffffffffffffff, &(0x7f0000002b00), &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002b80), &(0x7f0000002bc0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002c00)={0x0, @empty, @multicast1}, &(0x7f0000002c40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f00000000c0), 0xc, &(0x7f0000003340)={&(0x7f0000002d00)={0x14}, 0x14}}, 0x0) 03:35:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x1000000002, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x401, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, &(0x7f0000000300), 0x102000001) 03:35:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x1000000002, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x401, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, &(0x7f0000000300), 0x102000001) 03:35:31 executing program 5: syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) request_key(&(0x7f0000000540)='syzkaller\x00', &(0x7f0000000580), &(0x7f00000005c0)='-keyring#user.\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000600)='asymmetric\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000780), &(0x7f00000006c0), 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000b00)) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000700), 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000006c0)=""/178) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380), &(0x7f0000000040), 0x0, 0xfffffffffffffffe) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000008c0)=""/249) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f00000007c0)=""/3) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'syzkaller1\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000d40)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000e00)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e40)={{{@in=@broadcast, @in=@local}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000f40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003d80)={@mcast2}, &(0x7f0000003dc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003e00)={{{@in=@broadcast, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000003f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f40)={{{@in6=@mcast1, @in=@local}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000004040)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f00000043c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004400)={{{@in=@multicast2, @in=@remote}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000004500)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000004540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004580)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000009ec0)={0x0, @remote, @multicast1}, &(0x7f0000009f00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a080)={'erspan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000b680)={'dummy0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000b700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b740)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b780)={{{@in=@dev, @in6}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f000000b880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000b8c0)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b900)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000b940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b980)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b9c0)={{{@in, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f000000bac0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000c040)={0x0, @multicast2, @local}, &(0x7f000000c080)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c0c0)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f000000d140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000d180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000dd40)={&(0x7f0000000800), 0xc, &(0x7f000000dd00)={&(0x7f000000d1c0)={0x14}, 0x14}}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/llc\x00') memfd_create(&(0x7f00000009c0)='vmnet1eth1\'\x00', 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000200)=@assoc_value, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, &(0x7f00000003c0)=0x90) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:31 executing program 3: prctl$intptr(0x400000000018, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000440)=""/177) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x1000000002, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x401, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, &(0x7f0000000300), 0x102000001) 03:35:31 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x1000000002, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x401, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, &(0x7f0000000300), 0x102000001) 03:35:31 executing program 1: keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001600)={@dev}, &(0x7f0000001640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000016c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in, @in=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000018c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000002440), 0x0, 0x0, &(0x7f0000002500)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002540)={0x0, @multicast2, @loopback}, &(0x7f0000002580)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002600)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002640)={{{@in=@dev, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002740)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002780)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000027c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @broadcast}}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002900)={{{@in6=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000002a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000002a40)={'vcan0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002ac0)=0x14) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), 0x4) accept$packet(0xffffffffffffffff, &(0x7f0000002b00), &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002b80), &(0x7f0000002bc0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002c00)={0x0, @empty, @multicast1}, &(0x7f0000002c40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f00000000c0), 0xc, &(0x7f0000003340)={&(0x7f0000002d00)={0x14}, 0x14}}, 0x0) 03:35:31 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x1000000002, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x401, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, &(0x7f0000000300), 0x102000001) 03:35:31 executing program 4: keyctl$setperm(0x10, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001600)={@dev}, &(0x7f0000001640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000016c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in, @in=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000018c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000002440), 0x0, 0x0, &(0x7f0000002500)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002540)={0x0, @multicast2, @loopback}, &(0x7f0000002580)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002600)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002640)={{{@in=@dev, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002740)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002780)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000027c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @broadcast}}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002900)={{{@in6=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000002a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000002a40)={'vcan0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002ac0)=0x14) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), 0x4) accept$packet(0xffffffffffffffff, &(0x7f0000002b00), &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002b80), &(0x7f0000002bc0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002c00)={0x0, @empty, @multicast1}, &(0x7f0000002c40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f00000000c0), 0xc, &(0x7f0000003340)={&(0x7f0000002d00)={0x14}, 0x14}}, 0x0) 03:35:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x1000000002, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x401, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, &(0x7f0000000300), 0x102000001) 03:35:31 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x1000000002, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x401, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, &(0x7f0000000300), 0x102000001) 03:35:32 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockname(r0, &(0x7f0000000140)=@can, &(0x7f0000000080)=0x80) 03:35:32 executing program 2: keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000400)={0x77359400}, &(0x7f00000000c0), 0x0) socket$rds(0x15, 0x5, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) dup(0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000080)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:35:32 executing program 5: syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) request_key(&(0x7f0000000540)='syzkaller\x00', &(0x7f0000000580), &(0x7f00000005c0)='-keyring#user.\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000600)='asymmetric\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000780), &(0x7f00000006c0), 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000b00)) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000700), 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000006c0)=""/178) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380), &(0x7f0000000040), 0x0, 0xfffffffffffffffe) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000008c0)=""/249) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f00000007c0)=""/3) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'syzkaller1\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000d40)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000e00)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e40)={{{@in=@broadcast, @in=@local}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000f40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003d80)={@mcast2}, &(0x7f0000003dc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003e00)={{{@in=@broadcast, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000003f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f40)={{{@in6=@mcast1, @in=@local}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000004040)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f00000043c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004400)={{{@in=@multicast2, @in=@remote}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000004500)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000004540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004580)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000009ec0)={0x0, @remote, @multicast1}, &(0x7f0000009f00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a080)={'erspan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000b680)={'dummy0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000b700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b740)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b780)={{{@in=@dev, @in6}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f000000b880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000b8c0)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b900)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000b940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b980)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b9c0)={{{@in, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f000000bac0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000c040)={0x0, @multicast2, @local}, &(0x7f000000c080)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c0c0)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f000000d140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000d180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000dd40)={&(0x7f0000000800), 0xc, &(0x7f000000dd00)={&(0x7f000000d1c0)={0x14}, 0x14}}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/llc\x00') memfd_create(&(0x7f00000009c0)='vmnet1eth1\'\x00', 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000200)=@assoc_value, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, &(0x7f00000003c0)=0x90) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:32 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockname(r0, &(0x7f0000000140)=@can, &(0x7f0000000080)=0x80) 03:35:32 executing program 3: prctl$intptr(0x400000000018, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000440)=""/177) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:32 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockname(r0, &(0x7f0000000140)=@can, &(0x7f0000000080)=0x80) 03:35:32 executing program 1: keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001600)={@dev}, &(0x7f0000001640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000016c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in, @in=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000018c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000002440), 0x0, 0x0, &(0x7f0000002500)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002540)={0x0, @multicast2, @loopback}, &(0x7f0000002580)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002600)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002640)={{{@in=@dev, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002740)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002780)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000027c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @broadcast}}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002900)={{{@in6=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000002a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000002a40)={'vcan0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002ac0)=0x14) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), 0x4) accept$packet(0xffffffffffffffff, &(0x7f0000002b00), &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002b80), &(0x7f0000002bc0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002c00)={0x0, @empty, @multicast1}, &(0x7f0000002c40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f00000000c0), 0xc, &(0x7f0000003340)={&(0x7f0000002d00)={0x14}, 0x14}}, 0x0) 03:35:32 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) getsockname(r0, &(0x7f0000000140)=@can, &(0x7f0000000080)=0x80) 03:35:32 executing program 4: keyctl$set_reqkey_keyring(0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0726969cf69dc00d9ba8099000000800069203737c394947c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d334200001a1a83f0f65855018e31a3b786e2989ff0315561") socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xfffffeda) sched_rr_get_interval(0x0, &(0x7f0000000180)) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) gettid() prctl$setptracer(0x59616d61, 0x0) mq_open(&(0x7f0000000040)='\x00', 0x0, 0x0, &(0x7f0000000080)) getpid() timer_create(0x0, &(0x7f0000000140), &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) 03:35:32 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)=@sco, 0x80, &(0x7f0000000300)}, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000080), 0x1ce) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x31100, 0x8100, 0xd, @dev}, 0x80, &(0x7f0000000340), 0x25d, &(0x7f0000000380)}, 0x0) 03:35:32 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)=@sco, 0x80, &(0x7f0000000300)}, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000080), 0x1ce) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x31100, 0x8100, 0xd, @dev}, 0x80, &(0x7f0000000340), 0x25d, &(0x7f0000000380)}, 0x0) 03:35:32 executing program 2: keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000400)={0x77359400}, &(0x7f00000000c0), 0x0) socket$rds(0x15, 0x5, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) dup(0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000080)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:35:33 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)=@sco, 0x80, &(0x7f0000000300)}, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000080), 0x1ce) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x31100, 0x8100, 0xd, @dev}, 0x80, &(0x7f0000000340), 0x25d, &(0x7f0000000380)}, 0x0) 03:35:33 executing program 5: syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) request_key(&(0x7f0000000540)='syzkaller\x00', &(0x7f0000000580), &(0x7f00000005c0)='-keyring#user.\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000600)='asymmetric\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000780), &(0x7f00000006c0), 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000b00)) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000700), 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000006c0)=""/178) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380), &(0x7f0000000040), 0x0, 0xfffffffffffffffe) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000008c0)=""/249) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f00000007c0)=""/3) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'syzkaller1\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000d40)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000e00)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e40)={{{@in=@broadcast, @in=@local}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000f40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003d80)={@mcast2}, &(0x7f0000003dc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003e00)={{{@in=@broadcast, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000003f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f40)={{{@in6=@mcast1, @in=@local}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000004040)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f00000043c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004400)={{{@in=@multicast2, @in=@remote}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000004500)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000004540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004580)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000009ec0)={0x0, @remote, @multicast1}, &(0x7f0000009f00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a080)={'erspan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000b680)={'dummy0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000b700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b740)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b780)={{{@in=@dev, @in6}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f000000b880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000b8c0)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b900)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000b940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b980)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b9c0)={{{@in, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f000000bac0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000c040)={0x0, @multicast2, @local}, &(0x7f000000c080)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c0c0)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f000000d140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000d180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000dd40)={&(0x7f0000000800), 0xc, &(0x7f000000dd00)={&(0x7f000000d1c0)={0x14}, 0x14}}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/llc\x00') memfd_create(&(0x7f00000009c0)='vmnet1eth1\'\x00', 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000200)=@assoc_value, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, &(0x7f00000003c0)=0x90) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:33 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)=@sco, 0x80, &(0x7f0000000300)}, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000080), 0x1ce) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x31100, 0x8100, 0xd, @dev}, 0x80, &(0x7f0000000340), 0x25d, &(0x7f0000000380)}, 0x0) 03:35:33 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x200000, 0x40) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000040)=@hci, &(0x7f00000000c0)=0x80) syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180), 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)}], 0x1, &(0x7f00000000c0)}, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x5, 0x7, [0x0, 0x6, 0x9, 0xfff, 0x376e, 0x1a5, 0x10000000000]}, &(0x7f00000001c0)=0x16) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000300)={r2, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}, [0x9, 0x3, 0x7, 0x4c, 0x80000001, 0x8, 0x655, 0x800, 0x6, 0x4, 0xec0, 0x20, 0x30f0, 0x6667, 0x4]}, &(0x7f0000000200)=0x100) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 03:35:33 executing program 0: keyctl$set_reqkey_keyring(0x2, 0x0) pipe(&(0x7f0000000240)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:33 executing program 1: keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001600)={@dev}, &(0x7f0000001640)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000016c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in, @in=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000018c0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000002440), 0x0, 0x0, &(0x7f0000002500)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002540)={0x0, @multicast2, @loopback}, &(0x7f0000002580)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002600)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002640)={{{@in=@dev, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002740)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002780)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000027c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @broadcast}}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000028c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002900)={{{@in6=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000002a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000002a40)={'vcan0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002ac0)=0x14) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), 0x4) accept$packet(0xffffffffffffffff, &(0x7f0000002b00), &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002b80), &(0x7f0000002bc0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002c00)={0x0, @empty, @multicast1}, &(0x7f0000002c40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f00000000c0), 0xc, &(0x7f0000003340)={&(0x7f0000002d00)={0x14}, 0x14}}, 0x0) 03:35:33 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x200000, 0x40) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000040)=@hci, &(0x7f00000000c0)=0x80) syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180), 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)}], 0x1, &(0x7f00000000c0)}, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x5, 0x7, [0x0, 0x6, 0x9, 0xfff, 0x376e, 0x1a5, 0x10000000000]}, &(0x7f00000001c0)=0x16) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000300)={r2, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}, [0x9, 0x3, 0x7, 0x4c, 0x80000001, 0x8, 0x655, 0x800, 0x6, 0x4, 0xec0, 0x20, 0x30f0, 0x6667, 0x4]}, &(0x7f0000000200)=0x100) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 03:35:33 executing program 0: keyctl$set_reqkey_keyring(0x2, 0x0) pipe(&(0x7f0000000240)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:33 executing program 4: keyctl$set_reqkey_keyring(0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0726969cf69dc00d9ba8099000000800069203737c394947c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d334200001a1a83f0f65855018e31a3b786e2989ff0315561") socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xfffffeda) sched_rr_get_interval(0x0, &(0x7f0000000180)) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) gettid() prctl$setptracer(0x59616d61, 0x0) mq_open(&(0x7f0000000040)='\x00', 0x0, 0x0, &(0x7f0000000080)) getpid() timer_create(0x0, &(0x7f0000000140), &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) 03:35:33 executing program 2: keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000400)={0x77359400}, &(0x7f00000000c0), 0x0) socket$rds(0x15, 0x5, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) dup(0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000080)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:35:34 executing program 0: keyctl$set_reqkey_keyring(0x2, 0x0) pipe(&(0x7f0000000240)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:34 executing program 5: clock_nanosleep(0xfffffffffffffffe, 0x0, &(0x7f00000004c0), &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") creat(&(0x7f0000000180)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:35:34 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x200000, 0x40) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000040)=@hci, &(0x7f00000000c0)=0x80) syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180), 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)}], 0x1, &(0x7f00000000c0)}, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x5, 0x7, [0x0, 0x6, 0x9, 0xfff, 0x376e, 0x1a5, 0x10000000000]}, &(0x7f00000001c0)=0x16) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000300)={r2, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}, [0x9, 0x3, 0x7, 0x4c, 0x80000001, 0x8, 0x655, 0x800, 0x6, 0x4, 0xec0, 0x20, 0x30f0, 0x6667, 0x4]}, &(0x7f0000000200)=0x100) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 03:35:34 executing program 5: clock_nanosleep(0xfffffffffffffffe, 0x0, &(0x7f00000004c0), &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") creat(&(0x7f0000000180)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:35:34 executing program 0: keyctl$set_reqkey_keyring(0x2, 0x0) pipe(&(0x7f0000000240)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:34 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x9, 0x40, 0x1, 0x3, 0x4}, 0x14) r2 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000040)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="025c3f0a00145f8f764070") ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x12, 0x0, 0x0, "804e2486cff9d9266b6504d1017e922724e02697040000005249cf42d85e7f102204bb458c81a116e92835a7de67f1f800000000b74e77d3dd1a520200c1748d", "9b0fcdf54d8916989d30222a2d0b51e59e9dd68ff929a901016e96d8f4cc000043da0000d2000000000000b100", "73e37038ac9e1afce8d30c230037155d045737cfaa8dd98f8db0f64fe0594b51", [0x8]}) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400001, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) fallocate(r0, 0x0, 0x0, 0x8200003) 03:35:34 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x200000, 0x40) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000040)=@hci, &(0x7f00000000c0)=0x80) syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180), 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)}], 0x1, &(0x7f00000000c0)}, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x5, 0x7, [0x0, 0x6, 0x9, 0xfff, 0x376e, 0x1a5, 0x10000000000]}, &(0x7f00000001c0)=0x16) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000300)={r2, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}, [0x9, 0x3, 0x7, 0x4c, 0x80000001, 0x8, 0x655, 0x800, 0x6, 0x4, 0xec0, 0x20, 0x30f0, 0x6667, 0x4]}, &(0x7f0000000200)=0x100) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 03:35:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) r1 = socket$netlink(0x10, 0x3, 0x9) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 03:35:34 executing program 4: keyctl$set_reqkey_keyring(0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0726969cf69dc00d9ba8099000000800069203737c394947c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d334200001a1a83f0f65855018e31a3b786e2989ff0315561") socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xfffffeda) sched_rr_get_interval(0x0, &(0x7f0000000180)) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) gettid() prctl$setptracer(0x59616d61, 0x0) mq_open(&(0x7f0000000040)='\x00', 0x0, 0x0, &(0x7f0000000080)) getpid() timer_create(0x0, &(0x7f0000000140), &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) 03:35:34 executing program 5: clock_nanosleep(0xfffffffffffffffe, 0x0, &(0x7f00000004c0), &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") creat(&(0x7f0000000180)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:35:34 executing program 2: keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000400)={0x77359400}, &(0x7f00000000c0), 0x0) socket$rds(0x15, 0x5, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) dup(0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000080)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:35:35 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x9, 0x40, 0x1, 0x3, 0x4}, 0x14) r2 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000040)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="025c3f0a00145f8f764070") ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x12, 0x0, 0x0, "804e2486cff9d9266b6504d1017e922724e02697040000005249cf42d85e7f102204bb458c81a116e92835a7de67f1f800000000b74e77d3dd1a520200c1748d", "9b0fcdf54d8916989d30222a2d0b51e59e9dd68ff929a901016e96d8f4cc000043da0000d2000000000000b100", "73e37038ac9e1afce8d30c230037155d045737cfaa8dd98f8db0f64fe0594b51", [0x8]}) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400001, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) fallocate(r0, 0x0, 0x0, 0x8200003) 03:35:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) r1 = socket$netlink(0x10, 0x3, 0x9) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 03:35:35 executing program 5: clock_nanosleep(0xfffffffffffffffe, 0x0, &(0x7f00000004c0), &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") creat(&(0x7f0000000180)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:35:35 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x9, 0x40, 0x1, 0x3, 0x4}, 0x14) r2 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000040)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="025c3f0a00145f8f764070") ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x12, 0x0, 0x0, "804e2486cff9d9266b6504d1017e922724e02697040000005249cf42d85e7f102204bb458c81a116e92835a7de67f1f800000000b74e77d3dd1a520200c1748d", "9b0fcdf54d8916989d30222a2d0b51e59e9dd68ff929a901016e96d8f4cc000043da0000d2000000000000b100", "73e37038ac9e1afce8d30c230037155d045737cfaa8dd98f8db0f64fe0594b51", [0x8]}) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400001, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) fallocate(r0, 0x0, 0x0, 0x8200003) 03:35:35 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x9, 0x40, 0x1, 0x3, 0x4}, 0x14) r2 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000040)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="025c3f0a00145f8f764070") ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x12, 0x0, 0x0, "804e2486cff9d9266b6504d1017e922724e02697040000005249cf42d85e7f102204bb458c81a116e92835a7de67f1f800000000b74e77d3dd1a520200c1748d", "9b0fcdf54d8916989d30222a2d0b51e59e9dd68ff929a901016e96d8f4cc000043da0000d2000000000000b100", "73e37038ac9e1afce8d30c230037155d045737cfaa8dd98f8db0f64fe0594b51", [0x8]}) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400001, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) fallocate(r0, 0x0, 0x0, 0x8200003) 03:35:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) r1 = socket$netlink(0x10, 0x3, 0x9) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 03:35:35 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x9, 0x40, 0x1, 0x3, 0x4}, 0x14) r2 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000040)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="025c3f0a00145f8f764070") ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x12, 0x0, 0x0, "804e2486cff9d9266b6504d1017e922724e02697040000005249cf42d85e7f102204bb458c81a116e92835a7de67f1f800000000b74e77d3dd1a520200c1748d", "9b0fcdf54d8916989d30222a2d0b51e59e9dd68ff929a901016e96d8f4cc000043da0000d2000000000000b100", "73e37038ac9e1afce8d30c230037155d045737cfaa8dd98f8db0f64fe0594b51", [0x8]}) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400001, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) fallocate(r0, 0x0, 0x0, 0x8200003) 03:35:35 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x9, 0x40, 0x1, 0x3, 0x4}, 0x14) r2 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000040)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="025c3f0a00145f8f764070") ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x12, 0x0, 0x0, "804e2486cff9d9266b6504d1017e922724e02697040000005249cf42d85e7f102204bb458c81a116e92835a7de67f1f800000000b74e77d3dd1a520200c1748d", "9b0fcdf54d8916989d30222a2d0b51e59e9dd68ff929a901016e96d8f4cc000043da0000d2000000000000b100", "73e37038ac9e1afce8d30c230037155d045737cfaa8dd98f8db0f64fe0594b51", [0x8]}) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400001, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) fallocate(r0, 0x0, 0x0, 0x8200003) 03:35:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) r1 = socket$netlink(0x10, 0x3, 0x9) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 03:35:35 executing program 4: keyctl$set_reqkey_keyring(0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0726969cf69dc00d9ba8099000000800069203737c394947c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d334200001a1a83f0f65855018e31a3b786e2989ff0315561") socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xfffffeda) sched_rr_get_interval(0x0, &(0x7f0000000180)) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) gettid() prctl$setptracer(0x59616d61, 0x0) mq_open(&(0x7f0000000040)='\x00', 0x0, 0x0, &(0x7f0000000080)) getpid() timer_create(0x0, &(0x7f0000000140), &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) 03:35:35 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x9, 0x40, 0x1, 0x3, 0x4}, 0x14) r2 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000040)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="025c3f0a00145f8f764070") ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x12, 0x0, 0x0, "804e2486cff9d9266b6504d1017e922724e02697040000005249cf42d85e7f102204bb458c81a116e92835a7de67f1f800000000b74e77d3dd1a520200c1748d", "9b0fcdf54d8916989d30222a2d0b51e59e9dd68ff929a901016e96d8f4cc000043da0000d2000000000000b100", "73e37038ac9e1afce8d30c230037155d045737cfaa8dd98f8db0f64fe0594b51", [0x8]}) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400001, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) fallocate(r0, 0x0, 0x0, 0x8200003) 03:35:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x3001, 0x4, 0x0, 0x1}, 0x2c) 03:35:36 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x9, 0x40, 0x1, 0x3, 0x4}, 0x14) r2 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000040)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="025c3f0a00145f8f764070") ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x12, 0x0, 0x0, "804e2486cff9d9266b6504d1017e922724e02697040000005249cf42d85e7f102204bb458c81a116e92835a7de67f1f800000000b74e77d3dd1a520200c1748d", "9b0fcdf54d8916989d30222a2d0b51e59e9dd68ff929a901016e96d8f4cc000043da0000d2000000000000b100", "73e37038ac9e1afce8d30c230037155d045737cfaa8dd98f8db0f64fe0594b51", [0x8]}) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400001, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) fallocate(r0, 0x0, 0x0, 0x8200003) 03:35:36 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x9, 0x40, 0x1, 0x3, 0x4}, 0x14) r2 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000040)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="025c3f0a00145f8f764070") ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x12, 0x0, 0x0, "804e2486cff9d9266b6504d1017e922724e02697040000005249cf42d85e7f102204bb458c81a116e92835a7de67f1f800000000b74e77d3dd1a520200c1748d", "9b0fcdf54d8916989d30222a2d0b51e59e9dd68ff929a901016e96d8f4cc000043da0000d2000000000000b100", "73e37038ac9e1afce8d30c230037155d045737cfaa8dd98f8db0f64fe0594b51", [0x8]}) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400001, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) fallocate(r0, 0x0, 0x0, 0x8200003) 03:35:36 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x9, 0x40, 0x1, 0x3, 0x4}, 0x14) r2 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000040)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="025c3f0a00145f8f764070") ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x12, 0x0, 0x0, "804e2486cff9d9266b6504d1017e922724e02697040000005249cf42d85e7f102204bb458c81a116e92835a7de67f1f800000000b74e77d3dd1a520200c1748d", "9b0fcdf54d8916989d30222a2d0b51e59e9dd68ff929a901016e96d8f4cc000043da0000d2000000000000b100", "73e37038ac9e1afce8d30c230037155d045737cfaa8dd98f8db0f64fe0594b51", [0x8]}) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400001, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) fallocate(r0, 0x0, 0x0, 0x8200003) 03:35:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x3001, 0x4, 0x0, 0x1}, 0x2c) 03:35:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x3001, 0x4, 0x0, 0x1}, 0x2c) 03:35:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x3001, 0x4, 0x0, 0x1}, 0x2c) 03:35:36 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x9, 0x40, 0x1, 0x3, 0x4}, 0x14) r2 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000040)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="025c3f0a00145f8f764070") ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x12, 0x0, 0x0, "804e2486cff9d9266b6504d1017e922724e02697040000005249cf42d85e7f102204bb458c81a116e92835a7de67f1f800000000b74e77d3dd1a520200c1748d", "9b0fcdf54d8916989d30222a2d0b51e59e9dd68ff929a901016e96d8f4cc000043da0000d2000000000000b100", "73e37038ac9e1afce8d30c230037155d045737cfaa8dd98f8db0f64fe0594b51", [0x8]}) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400001, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) fallocate(r0, 0x0, 0x0, 0x8200003) 03:35:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000c, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000d40)={0x2, 0x0, @multicast1}, 0x10) 03:35:36 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x9, 0x40, 0x1, 0x3, 0x4}, 0x14) r2 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000040)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="025c3f0a00145f8f764070") ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x12, 0x0, 0x0, "804e2486cff9d9266b6504d1017e922724e02697040000005249cf42d85e7f102204bb458c81a116e92835a7de67f1f800000000b74e77d3dd1a520200c1748d", "9b0fcdf54d8916989d30222a2d0b51e59e9dd68ff929a901016e96d8f4cc000043da0000d2000000000000b100", "73e37038ac9e1afce8d30c230037155d045737cfaa8dd98f8db0f64fe0594b51", [0x8]}) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400001, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) fallocate(r0, 0x0, 0x0, 0x8200003) 03:35:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") msgget$private(0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/203) 03:35:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) 03:35:36 executing program 4: getrlimit(0x0, &(0x7f0000000300)) socket$key(0xf, 0x3, 0x2) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), 0xc) gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.stat\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @remote}, 0x0, {0x2, 0x0, @local}, 'tunl0\x00'}) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') fdatasync(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0), 0x0) gettid() socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/llc\x00') memfd_create(&(0x7f0000000140)='\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:35:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000c, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000d40)={0x2, 0x0, @multicast1}, 0x10) [ 1878.298310] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 03:35:37 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x9, 0x40, 0x1, 0x3, 0x4}, 0x14) r2 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000040)='nodev\x00', 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="025c3f0a00145f8f764070") ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x12, 0x0, 0x0, "804e2486cff9d9266b6504d1017e922724e02697040000005249cf42d85e7f102204bb458c81a116e92835a7de67f1f800000000b74e77d3dd1a520200c1748d", "9b0fcdf54d8916989d30222a2d0b51e59e9dd68ff929a901016e96d8f4cc000043da0000d2000000000000b100", "73e37038ac9e1afce8d30c230037155d045737cfaa8dd98f8db0f64fe0594b51", [0x8]}) fremovexattr(r1, &(0x7f00000000c0)=@known='user.syz\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400001, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) fallocate(r0, 0x0, 0x0, 0x8200003) [ 1878.363018] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. [ 1878.394551] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. [ 1878.430770] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. 03:35:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0xfffffffffffffcec, &(0x7f0000000140), 0x20b, &(0x7f0000000080)}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="ba0209000000000000e99f7b02adc2f2", 0x10}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) 03:35:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000c, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000d40)={0x2, 0x0, @multicast1}, 0x10) 03:35:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0xfffffffffffffcec, &(0x7f0000000140), 0x20b, &(0x7f0000000080)}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="ba0209000000000000e99f7b02adc2f2", 0x10}], 0x1, &(0x7f0000000100)}, 0x0) [ 1878.660043] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 03:35:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000c, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000d40)={0x2, 0x0, @multicast1}, 0x10) [ 1878.709554] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. 03:35:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0xfffffffffffffcec, &(0x7f0000000140), 0x20b, &(0x7f0000000080)}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="ba0209000000000000e99f7b02adc2f2", 0x10}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) [ 1878.917390] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1878.957135] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. 03:35:37 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001240)={{{@in=@multicast1, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000001340)=0xe8) getgid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001380)={{{@in=@remote, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000004500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004540)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000008a40)='./file0\x00', &(0x7f0000006a00)) stat(&(0x7f0000006a80)='./file0\x00', &(0x7f0000006ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006b40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006b80)={{{@in6, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000006c80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006cc0), &(0x7f0000006d00)=0xc) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008280)={{{@in6, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000008380)=0xe8) lstat(&(0x7f00000083c0)='./file0\x00', &(0x7f0000008400)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000008480)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000084c0)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000085c0)=0xe8) getgroups(0x0, &(0x7f0000008600)) gettid() getuid() lstat(&(0x7f0000008640)='./file0\x00', &(0x7f0000008680)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000008700)='./file0\x00', &(0x7f0000008740)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008900), 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) 03:35:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") msgget$private(0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/203) 03:35:38 executing program 4: getrlimit(0x0, &(0x7f0000000300)) socket$key(0xf, 0x3, 0x2) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), 0xc) gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.stat\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @remote}, 0x0, {0x2, 0x0, @local}, 'tunl0\x00'}) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') fdatasync(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0), 0x0) gettid() socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/llc\x00') memfd_create(&(0x7f0000000140)='\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:35:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) 03:35:38 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0xfffffffffffffcec, &(0x7f0000000140), 0x20b, &(0x7f0000000080)}, 0xc100) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="ba0209000000000000e99f7b02adc2f2", 0x10}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:38 executing program 3: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fchmod(0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x20, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0, &(0x7f0000000a80)={0x0, 0x1c9c380}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 1879.351884] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1879.391584] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. 03:35:38 executing program 5: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ec0)={{{@in, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002fc0)=0xe8) getegid() accept(0xffffffffffffffff, &(0x7f0000003000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003080)=0x80) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000030c0)={{{@in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000031c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000033c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003400)) getpgid(0x0) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003980), &(0x7f00000039c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a80)) getuid() getresgid(&(0x7f0000003ac0), &(0x7f0000003b00), &(0x7f0000003b40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003b80)={{{@in6=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000003c80)=0xe8) getgroups(0x0, &(0x7f0000003cc0)) getpgrp(0xffffffffffffffff) stat(&(0x7f0000003d00)='./file0\x00', &(0x7f0000003d40)) getgroups(0x0, &(0x7f0000004840)) getpgid(0xffffffffffffffff) stat(&(0x7f0000003e00)='./file1\x00', &(0x7f0000003e40)) getgroups(0x0, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f40), &(0x7f0000003f80)=0xc) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003fc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004000)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000004100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004140)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) lstat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000004600)) getpgid(0x0) getuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f00000005c0)=""/247, 0xf7}, 0x120) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) 03:35:38 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28, &(0x7f0000000080)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180), 0xc) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) socketpair$nbd(0x2, 0x1, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") msgget$private(0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/203) 03:35:38 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001240)={{{@in=@multicast1, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000001340)=0xe8) getgid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001380)={{{@in=@remote, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000004500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004540)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000008a40)='./file0\x00', &(0x7f0000006a00)) stat(&(0x7f0000006a80)='./file0\x00', &(0x7f0000006ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006b40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006b80)={{{@in6, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000006c80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006cc0), &(0x7f0000006d00)=0xc) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008280)={{{@in6, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000008380)=0xe8) lstat(&(0x7f00000083c0)='./file0\x00', &(0x7f0000008400)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000008480)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000084c0)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000085c0)=0xe8) getgroups(0x0, &(0x7f0000008600)) gettid() getuid() lstat(&(0x7f0000008640)='./file0\x00', &(0x7f0000008680)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000008700)='./file0\x00', &(0x7f0000008740)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008900), 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) 03:35:38 executing program 3: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fchmod(0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x20, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0, &(0x7f0000000a80)={0x0, 0x1c9c380}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:38 executing program 4: getrlimit(0x0, &(0x7f0000000300)) socket$key(0xf, 0x3, 0x2) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), 0xc) gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.stat\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @remote}, 0x0, {0x2, 0x0, @local}, 'tunl0\x00'}) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') fdatasync(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0), 0x0) gettid() socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/llc\x00') memfd_create(&(0x7f0000000140)='\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:35:39 executing program 5: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ec0)={{{@in, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002fc0)=0xe8) getegid() accept(0xffffffffffffffff, &(0x7f0000003000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003080)=0x80) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000030c0)={{{@in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000031c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000033c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003400)) getpgid(0x0) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003980), &(0x7f00000039c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a80)) getuid() getresgid(&(0x7f0000003ac0), &(0x7f0000003b00), &(0x7f0000003b40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003b80)={{{@in6=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000003c80)=0xe8) getgroups(0x0, &(0x7f0000003cc0)) getpgrp(0xffffffffffffffff) stat(&(0x7f0000003d00)='./file0\x00', &(0x7f0000003d40)) getgroups(0x0, &(0x7f0000004840)) getpgid(0xffffffffffffffff) stat(&(0x7f0000003e00)='./file1\x00', &(0x7f0000003e40)) getgroups(0x0, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f40), &(0x7f0000003f80)=0xc) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003fc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004000)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000004100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004140)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) lstat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000004600)) getpgid(0x0) getuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f00000005c0)=""/247, 0xf7}, 0x120) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) 03:35:39 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28, &(0x7f0000000080)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180), 0xc) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) socketpair$nbd(0x2, 0x1, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:39 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001240)={{{@in=@multicast1, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000001340)=0xe8) getgid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001380)={{{@in=@remote, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000004500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004540)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000008a40)='./file0\x00', &(0x7f0000006a00)) stat(&(0x7f0000006a80)='./file0\x00', &(0x7f0000006ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006b40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006b80)={{{@in6, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000006c80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006cc0), &(0x7f0000006d00)=0xc) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008280)={{{@in6, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000008380)=0xe8) lstat(&(0x7f00000083c0)='./file0\x00', &(0x7f0000008400)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000008480)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000084c0)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000085c0)=0xe8) getgroups(0x0, &(0x7f0000008600)) gettid() getuid() lstat(&(0x7f0000008640)='./file0\x00', &(0x7f0000008680)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000008700)='./file0\x00', &(0x7f0000008740)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008900), 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) 03:35:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") msgget$private(0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/203) 03:35:39 executing program 3: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fchmod(0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x20, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0, &(0x7f0000000a80)={0x0, 0x1c9c380}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:39 executing program 4: getrlimit(0x0, &(0x7f0000000300)) socket$key(0xf, 0x3, 0x2) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), 0xc) gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.stat\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @remote}, 0x0, {0x2, 0x0, @local}, 'tunl0\x00'}) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') fdatasync(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0), 0x0) gettid() socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/llc\x00') memfd_create(&(0x7f0000000140)='\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:35:40 executing program 5: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ec0)={{{@in, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002fc0)=0xe8) getegid() accept(0xffffffffffffffff, &(0x7f0000003000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003080)=0x80) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000030c0)={{{@in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000031c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000033c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003400)) getpgid(0x0) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003980), &(0x7f00000039c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a80)) getuid() getresgid(&(0x7f0000003ac0), &(0x7f0000003b00), &(0x7f0000003b40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003b80)={{{@in6=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000003c80)=0xe8) getgroups(0x0, &(0x7f0000003cc0)) getpgrp(0xffffffffffffffff) stat(&(0x7f0000003d00)='./file0\x00', &(0x7f0000003d40)) getgroups(0x0, &(0x7f0000004840)) getpgid(0xffffffffffffffff) stat(&(0x7f0000003e00)='./file1\x00', &(0x7f0000003e40)) getgroups(0x0, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f40), &(0x7f0000003f80)=0xc) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003fc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004000)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000004100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004140)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) lstat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000004600)) getpgid(0x0) getuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f00000005c0)=""/247, 0xf7}, 0x120) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) 03:35:40 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28, &(0x7f0000000080)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180), 0xc) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) socketpair$nbd(0x2, 0x1, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:40 executing program 0: r0 = creat(&(0x7f0000000180)='./file1\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file1'}, 0xb) pwritev(r0, &(0x7f0000003440)=[{&(0x7f0000000200)='h', 0x1}], 0x1, 0x40000) fadvise64(r0, 0x0, 0x10000, 0x4) 03:35:40 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001240)={{{@in=@multicast1, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000001340)=0xe8) getgid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001380)={{{@in=@remote, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000004500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004540)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000008a40)='./file0\x00', &(0x7f0000006a00)) stat(&(0x7f0000006a80)='./file0\x00', &(0x7f0000006ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006b40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006b80)={{{@in6, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000006c80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006cc0), &(0x7f0000006d00)=0xc) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008280)={{{@in6, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000008380)=0xe8) lstat(&(0x7f00000083c0)='./file0\x00', &(0x7f0000008400)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000008480)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000084c0)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000085c0)=0xe8) getgroups(0x0, &(0x7f0000008600)) gettid() getuid() lstat(&(0x7f0000008640)='./file0\x00', &(0x7f0000008680)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000008700)='./file0\x00', &(0x7f0000008740)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008900), 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) 03:35:40 executing program 0: r0 = creat(&(0x7f0000000180)='./file1\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file1'}, 0xb) pwritev(r0, &(0x7f0000003440)=[{&(0x7f0000000200)='h', 0x1}], 0x1, 0x40000) fadvise64(r0, 0x0, 0x10000, 0x4) 03:35:40 executing program 0: r0 = creat(&(0x7f0000000180)='./file1\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file1'}, 0xb) pwritev(r0, &(0x7f0000003440)=[{&(0x7f0000000200)='h', 0x1}], 0x1, 0x40000) fadvise64(r0, 0x0, 0x10000, 0x4) 03:35:40 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000000)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 03:35:40 executing program 0: r0 = creat(&(0x7f0000000180)='./file1\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file1'}, 0xb) pwritev(r0, &(0x7f0000003440)=[{&(0x7f0000000200)='h', 0x1}], 0x1, 0x40000) fadvise64(r0, 0x0, 0x10000, 0x4) 03:35:41 executing program 3: ustat(0x15, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) semget(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/rfcomm\x00') write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000380)={0x8}, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_settime(0x0, &(0x7f0000000200)) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/82) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{}, 'port0\x00'}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000400)}}, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000540)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000580)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}}, 0x0) fchmod(0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x20, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0, &(0x7f0000000a80)={0x0, 0x1c9c380}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:41 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28, &(0x7f0000000080)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180), 0xc) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) socketpair$nbd(0x2, 0x1, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:35:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000000)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 03:35:41 executing program 5: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ec0)={{{@in, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002fc0)=0xe8) getegid() accept(0xffffffffffffffff, &(0x7f0000003000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003080)=0x80) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000030c0)={{{@in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000031c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000033c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003400)) getpgid(0x0) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003980), &(0x7f00000039c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a80)) getuid() getresgid(&(0x7f0000003ac0), &(0x7f0000003b00), &(0x7f0000003b40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003b80)={{{@in6=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000003c80)=0xe8) getgroups(0x0, &(0x7f0000003cc0)) getpgrp(0xffffffffffffffff) stat(&(0x7f0000003d00)='./file0\x00', &(0x7f0000003d40)) getgroups(0x0, &(0x7f0000004840)) getpgid(0xffffffffffffffff) stat(&(0x7f0000003e00)='./file1\x00', &(0x7f0000003e40)) getgroups(0x0, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f40), &(0x7f0000003f80)=0xc) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003fc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004000)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000004100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004140)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) lstat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000004600)) getpgid(0x0) getuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f00000005c0)=""/247, 0xf7}, 0x120) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) 03:35:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) r4 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0xffffffff80000000) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x7) dup2(r1, r3) 03:35:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000000)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 03:35:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) r4 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0xffffffff80000000) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x7) dup2(r1, r3) 03:35:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000000)={r1, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 03:35:41 executing program 2: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = creat(&(0x7f0000001380)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0, 0x19, 0x1, {0x400, {0x48, 0x4, 0x8}, 0x100, r2, r3, 0x5, 0x9, 0x400000000000000, 0x401, 0x5, 0x0, 0xff, 0x50000000000, 0x9, 0xfffffffffffffffd, 0x7ff, 0x5, 0xc11, 0x80b, 0xfff}}, 0xa0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r5 = accept(0xffffffffffffffff, &(0x7f0000000300)=@in={0x2, 0x0, @rand_addr}, &(0x7f00000000c0)=0x80) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r4, 0x0, 0x0, 0x1000f4) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') accept4(r4, &(0x7f00000004c0)=@xdp, &(0x7f0000000540)=0x80, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@mcast1, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@local, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@loopback, @in6=@ipv4}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000980)={0x0, @remote, @remote}, &(0x7f00000009c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000bc0)={'dummy0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000d40)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000dc0)=0x14) getsockopt$inet6_mreq(r5, 0x29, 0x15, &(0x7f0000001000)={@ipv4={[], [], @remote}}, &(0x7f0000001040)=0x14) getsockname$packet(r4, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001100)=0x14) accept$packet(r1, &(0x7f0000002640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002680)=0x14) getsockname$packet(r0, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002700)=0x14) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000002740)={0x0, @rand_addr, @rand_addr}, &(0x7f0000002780)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002800)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000002900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000002940)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002980)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000002a80)=0xe8) accept$packet(r4, &(0x7f0000002ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000002b40)={{{@in6=@mcast2, @in=@dev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000002c40)=0xe8) getpeername(r4, &(0x7f0000002c80)=@hci, &(0x7f0000002d00)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002d40)={{{@in=@multicast2, @in=@local}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000002e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002e80)={'team0\x00'}) getsockname(r0, &(0x7f0000002ec0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000002f40)=0x80) accept4$packet(r0, &(0x7f0000002f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002fc0)=0x14, 0x80000) recvmmsg(r1, &(0x7f000000ce00)=[{{&(0x7f0000003040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003180)=[{&(0x7f00000030c0)=""/57, 0x39}, {&(0x7f0000003100)=""/115, 0x73}], 0x2, &(0x7f00000031c0)=""/1, 0x1, 0x5}, 0x4}, {{&(0x7f0000003200)=@nfc, 0x80, &(0x7f0000005280)=[{&(0x7f0000003280)=""/4096, 0x1000}, {&(0x7f0000004280)=""/4096, 0x1000}], 0x2, &(0x7f00000052c0)=""/80, 0x50, 0x9}}, {{&(0x7f0000005340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000005740)=[{&(0x7f00000053c0)=""/94, 0x5e}, {&(0x7f0000005440)=""/230, 0xe6}, {&(0x7f0000005540)=""/86, 0x56}, {&(0x7f00000055c0)=""/4, 0x4}, {&(0x7f0000005600)=""/60, 0x3c}, {&(0x7f0000005640)=""/198, 0xc6}], 0x6, 0x0, 0x0, 0x1}, 0x3a}, {{&(0x7f00000057c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000006c00)=[{&(0x7f0000005840)=""/227, 0xe3}, {&(0x7f0000005940)=""/186, 0xba}, {&(0x7f0000005a00)=""/200, 0xc8}, {&(0x7f0000005b00)=""/4096, 0x1000}, {&(0x7f0000006b00)=""/49, 0x31}, {&(0x7f0000006b40)=""/160, 0xa0}], 0x6, &(0x7f0000006c80)=""/4096, 0x1000, 0x1ff}, 0x3}, {{&(0x7f0000007c80)=@pppol2tp, 0x80, &(0x7f0000007fc0)=[{&(0x7f0000007e00)=""/113, 0x71}, {&(0x7f0000007e80)=""/117, 0x75}, {&(0x7f0000007f00)=""/40, 0x28}, {&(0x7f0000007f40)=""/120, 0x78}], 0x4, 0x0, 0x0, 0x2a0}, 0x5}, {{&(0x7f0000008040)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000a2c0)=[{&(0x7f00000080c0)=""/4096, 0x1000}, {&(0x7f00000090c0)=""/188, 0xbc}, {&(0x7f0000009180)=""/90, 0x5a}, {&(0x7f0000009200)=""/4096, 0x1000}, {&(0x7f000000a200)=""/146, 0x92}], 0x5, &(0x7f000000a340)=""/193, 0xc1, 0x8}, 0x9}, {{&(0x7f000000a440)=@can, 0x80, &(0x7f000000b6c0)=[{&(0x7f000000a4c0)=""/4096, 0x1000}, {&(0x7f000000b4c0)=""/252, 0xfc}, {&(0x7f000000b5c0)=""/92, 0x5c}, {&(0x7f000000b640)=""/113, 0x71}], 0x4, &(0x7f000000b700)=""/13, 0xd}, 0x1f}, {{&(0x7f000000b740)=@ethernet, 0x80, &(0x7f000000b940)=[{&(0x7f000000b7c0)=""/164, 0xa4}, {&(0x7f000000b880)=""/120, 0x78}, {&(0x7f000000b900)=""/48, 0x30}], 0x3, 0x0, 0x0, 0x100000001}, 0x1}, {{&(0x7f000000b980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f000000cd40)=[{&(0x7f000000ba00)=""/4096, 0x1000}, {&(0x7f000000ca00)=""/37, 0x25}, {&(0x7f000000ca40)=""/224, 0xe0}, {&(0x7f000000cb40)=""/217, 0xd9}, {&(0x7f000000cc40)=""/216, 0xd8}], 0x5, &(0x7f000000cdc0)=""/58, 0x3a, 0x200}, 0x7}], 0x9, 0x40000000, 0x0) getsockname$packet(r0, &(0x7f000000d040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d080)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f000000d0c0)={{{@in=@rand_addr, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f000000d1c0)=0xe8) accept$packet(r0, &(0x7f000000d2c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d300)=0x14) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000ddc0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000000dd80)={&(0x7f000000d340)={0x1b0, r7, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r8}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0x10c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r13}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r14 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000100)) sendfile(r0, r14, &(0x7f0000d83ff8), 0x8000fffffffe) 03:35:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) r4 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0xffffffff80000000) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x7) dup2(r1, r3) 03:35:41 executing program 4: socket$inet(0x2, 0xfffffffffffffffe, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000009c0)=""/164) setns(0xffffffffffffffff, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ftruncate(0xffffffffffffffff, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000300), &(0x7f00000004c0)=0x18) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000500), 0x8) 03:35:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) r4 = syz_open_pts(r2, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0xffffffff80000000) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x7) dup2(r1, r3) 03:35:42 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000440), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) munlockall() syz_extract_tcp_res$synack(&(0x7f00000004c0), 0x1, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) geteuid() lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000001580)) syz_execute_func(&(0x7f00000003c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:35:42 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) move_pages(r1, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000000c0), 0x0) 03:35:42 executing program 2: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = creat(&(0x7f0000001380)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0, 0x19, 0x1, {0x400, {0x48, 0x4, 0x8}, 0x100, r2, r3, 0x5, 0x9, 0x400000000000000, 0x401, 0x5, 0x0, 0xff, 0x50000000000, 0x9, 0xfffffffffffffffd, 0x7ff, 0x5, 0xc11, 0x80b, 0xfff}}, 0xa0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r5 = accept(0xffffffffffffffff, &(0x7f0000000300)=@in={0x2, 0x0, @rand_addr}, &(0x7f00000000c0)=0x80) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r4, 0x0, 0x0, 0x1000f4) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') accept4(r4, &(0x7f00000004c0)=@xdp, &(0x7f0000000540)=0x80, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@mcast1, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@local, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@loopback, @in6=@ipv4}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000980)={0x0, @remote, @remote}, &(0x7f00000009c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000bc0)={'dummy0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000d40)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000dc0)=0x14) getsockopt$inet6_mreq(r5, 0x29, 0x15, &(0x7f0000001000)={@ipv4={[], [], @remote}}, &(0x7f0000001040)=0x14) getsockname$packet(r4, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001100)=0x14) accept$packet(r1, &(0x7f0000002640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002680)=0x14) getsockname$packet(r0, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002700)=0x14) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000002740)={0x0, @rand_addr, @rand_addr}, &(0x7f0000002780)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002800)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000002900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000002940)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002980)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000002a80)=0xe8) accept$packet(r4, &(0x7f0000002ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000002b40)={{{@in6=@mcast2, @in=@dev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000002c40)=0xe8) getpeername(r4, &(0x7f0000002c80)=@hci, &(0x7f0000002d00)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002d40)={{{@in=@multicast2, @in=@local}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000002e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002e80)={'team0\x00'}) getsockname(r0, &(0x7f0000002ec0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000002f40)=0x80) accept4$packet(r0, &(0x7f0000002f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002fc0)=0x14, 0x80000) recvmmsg(r1, &(0x7f000000ce00)=[{{&(0x7f0000003040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003180)=[{&(0x7f00000030c0)=""/57, 0x39}, {&(0x7f0000003100)=""/115, 0x73}], 0x2, &(0x7f00000031c0)=""/1, 0x1, 0x5}, 0x4}, {{&(0x7f0000003200)=@nfc, 0x80, &(0x7f0000005280)=[{&(0x7f0000003280)=""/4096, 0x1000}, {&(0x7f0000004280)=""/4096, 0x1000}], 0x2, &(0x7f00000052c0)=""/80, 0x50, 0x9}}, {{&(0x7f0000005340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000005740)=[{&(0x7f00000053c0)=""/94, 0x5e}, {&(0x7f0000005440)=""/230, 0xe6}, {&(0x7f0000005540)=""/86, 0x56}, {&(0x7f00000055c0)=""/4, 0x4}, {&(0x7f0000005600)=""/60, 0x3c}, {&(0x7f0000005640)=""/198, 0xc6}], 0x6, 0x0, 0x0, 0x1}, 0x3a}, {{&(0x7f00000057c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000006c00)=[{&(0x7f0000005840)=""/227, 0xe3}, {&(0x7f0000005940)=""/186, 0xba}, {&(0x7f0000005a00)=""/200, 0xc8}, {&(0x7f0000005b00)=""/4096, 0x1000}, {&(0x7f0000006b00)=""/49, 0x31}, {&(0x7f0000006b40)=""/160, 0xa0}], 0x6, &(0x7f0000006c80)=""/4096, 0x1000, 0x1ff}, 0x3}, {{&(0x7f0000007c80)=@pppol2tp, 0x80, &(0x7f0000007fc0)=[{&(0x7f0000007e00)=""/113, 0x71}, {&(0x7f0000007e80)=""/117, 0x75}, {&(0x7f0000007f00)=""/40, 0x28}, {&(0x7f0000007f40)=""/120, 0x78}], 0x4, 0x0, 0x0, 0x2a0}, 0x5}, {{&(0x7f0000008040)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000a2c0)=[{&(0x7f00000080c0)=""/4096, 0x1000}, {&(0x7f00000090c0)=""/188, 0xbc}, {&(0x7f0000009180)=""/90, 0x5a}, {&(0x7f0000009200)=""/4096, 0x1000}, {&(0x7f000000a200)=""/146, 0x92}], 0x5, &(0x7f000000a340)=""/193, 0xc1, 0x8}, 0x9}, {{&(0x7f000000a440)=@can, 0x80, &(0x7f000000b6c0)=[{&(0x7f000000a4c0)=""/4096, 0x1000}, {&(0x7f000000b4c0)=""/252, 0xfc}, {&(0x7f000000b5c0)=""/92, 0x5c}, {&(0x7f000000b640)=""/113, 0x71}], 0x4, &(0x7f000000b700)=""/13, 0xd}, 0x1f}, {{&(0x7f000000b740)=@ethernet, 0x80, &(0x7f000000b940)=[{&(0x7f000000b7c0)=""/164, 0xa4}, {&(0x7f000000b880)=""/120, 0x78}, {&(0x7f000000b900)=""/48, 0x30}], 0x3, 0x0, 0x0, 0x100000001}, 0x1}, {{&(0x7f000000b980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f000000cd40)=[{&(0x7f000000ba00)=""/4096, 0x1000}, {&(0x7f000000ca00)=""/37, 0x25}, {&(0x7f000000ca40)=""/224, 0xe0}, {&(0x7f000000cb40)=""/217, 0xd9}, {&(0x7f000000cc40)=""/216, 0xd8}], 0x5, &(0x7f000000cdc0)=""/58, 0x3a, 0x200}, 0x7}], 0x9, 0x40000000, 0x0) getsockname$packet(r0, &(0x7f000000d040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d080)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f000000d0c0)={{{@in=@rand_addr, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f000000d1c0)=0xe8) accept$packet(r0, &(0x7f000000d2c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d300)=0x14) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000ddc0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000000dd80)={&(0x7f000000d340)={0x1b0, r7, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r8}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0x10c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r13}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r14 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000100)) sendfile(r0, r14, &(0x7f0000d83ff8), 0x8000fffffffe) 03:35:42 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) move_pages(r1, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000000c0), 0x0) 03:35:42 executing program 3: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = creat(&(0x7f0000001380)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0, 0x19, 0x1, {0x400, {0x48, 0x4, 0x8}, 0x100, r2, r3, 0x5, 0x9, 0x400000000000000, 0x401, 0x5, 0x0, 0xff, 0x50000000000, 0x9, 0xfffffffffffffffd, 0x7ff, 0x5, 0xc11, 0x80b, 0xfff}}, 0xa0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r5 = accept(0xffffffffffffffff, &(0x7f0000000300)=@in={0x2, 0x0, @rand_addr}, &(0x7f00000000c0)=0x80) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r4, 0x0, 0x0, 0x1000f4) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') accept4(r4, &(0x7f00000004c0)=@xdp, &(0x7f0000000540)=0x80, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@mcast1, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@local, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@loopback, @in6=@ipv4}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000980)={0x0, @remote, @remote}, &(0x7f00000009c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000bc0)={'dummy0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000d40)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000dc0)=0x14) getsockopt$inet6_mreq(r5, 0x29, 0x15, &(0x7f0000001000)={@ipv4={[], [], @remote}}, &(0x7f0000001040)=0x14) getsockname$packet(r4, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001100)=0x14) accept$packet(r1, &(0x7f0000002640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002680)=0x14) getsockname$packet(r0, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002700)=0x14) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000002740)={0x0, @rand_addr, @rand_addr}, &(0x7f0000002780)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002800)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000002900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000002940)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002980)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000002a80)=0xe8) accept$packet(r4, &(0x7f0000002ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000002b40)={{{@in6=@mcast2, @in=@dev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000002c40)=0xe8) getpeername(r4, &(0x7f0000002c80)=@hci, &(0x7f0000002d00)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002d40)={{{@in=@multicast2, @in=@local}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000002e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002e80)={'team0\x00'}) getsockname(r0, &(0x7f0000002ec0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000002f40)=0x80) accept4$packet(r0, &(0x7f0000002f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002fc0)=0x14, 0x80000) recvmmsg(r1, &(0x7f000000ce00)=[{{&(0x7f0000003040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003180)=[{&(0x7f00000030c0)=""/57, 0x39}, {&(0x7f0000003100)=""/115, 0x73}], 0x2, &(0x7f00000031c0)=""/1, 0x1, 0x5}, 0x4}, {{&(0x7f0000003200)=@nfc, 0x80, &(0x7f0000005280)=[{&(0x7f0000003280)=""/4096, 0x1000}, {&(0x7f0000004280)=""/4096, 0x1000}], 0x2, &(0x7f00000052c0)=""/80, 0x50, 0x9}}, {{&(0x7f0000005340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000005740)=[{&(0x7f00000053c0)=""/94, 0x5e}, {&(0x7f0000005440)=""/230, 0xe6}, {&(0x7f0000005540)=""/86, 0x56}, {&(0x7f00000055c0)=""/4, 0x4}, {&(0x7f0000005600)=""/60, 0x3c}, {&(0x7f0000005640)=""/198, 0xc6}], 0x6, 0x0, 0x0, 0x1}, 0x3a}, {{&(0x7f00000057c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000006c00)=[{&(0x7f0000005840)=""/227, 0xe3}, {&(0x7f0000005940)=""/186, 0xba}, {&(0x7f0000005a00)=""/200, 0xc8}, {&(0x7f0000005b00)=""/4096, 0x1000}, {&(0x7f0000006b00)=""/49, 0x31}, {&(0x7f0000006b40)=""/160, 0xa0}], 0x6, &(0x7f0000006c80)=""/4096, 0x1000, 0x1ff}, 0x3}, {{&(0x7f0000007c80)=@pppol2tp, 0x80, &(0x7f0000007fc0)=[{&(0x7f0000007e00)=""/113, 0x71}, {&(0x7f0000007e80)=""/117, 0x75}, {&(0x7f0000007f00)=""/40, 0x28}, {&(0x7f0000007f40)=""/120, 0x78}], 0x4, 0x0, 0x0, 0x2a0}, 0x5}, {{&(0x7f0000008040)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000a2c0)=[{&(0x7f00000080c0)=""/4096, 0x1000}, {&(0x7f00000090c0)=""/188, 0xbc}, {&(0x7f0000009180)=""/90, 0x5a}, {&(0x7f0000009200)=""/4096, 0x1000}, {&(0x7f000000a200)=""/146, 0x92}], 0x5, &(0x7f000000a340)=""/193, 0xc1, 0x8}, 0x9}, {{&(0x7f000000a440)=@can, 0x80, &(0x7f000000b6c0)=[{&(0x7f000000a4c0)=""/4096, 0x1000}, {&(0x7f000000b4c0)=""/252, 0xfc}, {&(0x7f000000b5c0)=""/92, 0x5c}, {&(0x7f000000b640)=""/113, 0x71}], 0x4, &(0x7f000000b700)=""/13, 0xd}, 0x1f}, {{&(0x7f000000b740)=@ethernet, 0x80, &(0x7f000000b940)=[{&(0x7f000000b7c0)=""/164, 0xa4}, {&(0x7f000000b880)=""/120, 0x78}, {&(0x7f000000b900)=""/48, 0x30}], 0x3, 0x0, 0x0, 0x100000001}, 0x1}, {{&(0x7f000000b980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f000000cd40)=[{&(0x7f000000ba00)=""/4096, 0x1000}, {&(0x7f000000ca00)=""/37, 0x25}, {&(0x7f000000ca40)=""/224, 0xe0}, {&(0x7f000000cb40)=""/217, 0xd9}, {&(0x7f000000cc40)=""/216, 0xd8}], 0x5, &(0x7f000000cdc0)=""/58, 0x3a, 0x200}, 0x7}], 0x9, 0x40000000, 0x0) getsockname$packet(r0, &(0x7f000000d040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d080)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f000000d0c0)={{{@in=@rand_addr, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f000000d1c0)=0xe8) accept$packet(r0, &(0x7f000000d2c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d300)=0x14) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000ddc0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000000dd80)={&(0x7f000000d340)={0x1b0, r7, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r8}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0x10c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r13}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r14 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000100)) sendfile(r0, r14, &(0x7f0000d83ff8), 0x8000fffffffe) 03:35:42 executing program 2: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = creat(&(0x7f0000001380)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0, 0x19, 0x1, {0x400, {0x48, 0x4, 0x8}, 0x100, r2, r3, 0x5, 0x9, 0x400000000000000, 0x401, 0x5, 0x0, 0xff, 0x50000000000, 0x9, 0xfffffffffffffffd, 0x7ff, 0x5, 0xc11, 0x80b, 0xfff}}, 0xa0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r5 = accept(0xffffffffffffffff, &(0x7f0000000300)=@in={0x2, 0x0, @rand_addr}, &(0x7f00000000c0)=0x80) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r4, 0x0, 0x0, 0x1000f4) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') accept4(r4, &(0x7f00000004c0)=@xdp, &(0x7f0000000540)=0x80, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@mcast1, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@local, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@loopback, @in6=@ipv4}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000980)={0x0, @remote, @remote}, &(0x7f00000009c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000bc0)={'dummy0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000d40)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000dc0)=0x14) getsockopt$inet6_mreq(r5, 0x29, 0x15, &(0x7f0000001000)={@ipv4={[], [], @remote}}, &(0x7f0000001040)=0x14) getsockname$packet(r4, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001100)=0x14) accept$packet(r1, &(0x7f0000002640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002680)=0x14) getsockname$packet(r0, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002700)=0x14) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000002740)={0x0, @rand_addr, @rand_addr}, &(0x7f0000002780)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002800)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000002900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000002940)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002980)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000002a80)=0xe8) accept$packet(r4, &(0x7f0000002ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000002b40)={{{@in6=@mcast2, @in=@dev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000002c40)=0xe8) getpeername(r4, &(0x7f0000002c80)=@hci, &(0x7f0000002d00)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002d40)={{{@in=@multicast2, @in=@local}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000002e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002e80)={'team0\x00'}) getsockname(r0, &(0x7f0000002ec0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000002f40)=0x80) accept4$packet(r0, &(0x7f0000002f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002fc0)=0x14, 0x80000) recvmmsg(r1, &(0x7f000000ce00)=[{{&(0x7f0000003040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003180)=[{&(0x7f00000030c0)=""/57, 0x39}, {&(0x7f0000003100)=""/115, 0x73}], 0x2, &(0x7f00000031c0)=""/1, 0x1, 0x5}, 0x4}, {{&(0x7f0000003200)=@nfc, 0x80, &(0x7f0000005280)=[{&(0x7f0000003280)=""/4096, 0x1000}, {&(0x7f0000004280)=""/4096, 0x1000}], 0x2, &(0x7f00000052c0)=""/80, 0x50, 0x9}}, {{&(0x7f0000005340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000005740)=[{&(0x7f00000053c0)=""/94, 0x5e}, {&(0x7f0000005440)=""/230, 0xe6}, {&(0x7f0000005540)=""/86, 0x56}, {&(0x7f00000055c0)=""/4, 0x4}, {&(0x7f0000005600)=""/60, 0x3c}, {&(0x7f0000005640)=""/198, 0xc6}], 0x6, 0x0, 0x0, 0x1}, 0x3a}, {{&(0x7f00000057c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000006c00)=[{&(0x7f0000005840)=""/227, 0xe3}, {&(0x7f0000005940)=""/186, 0xba}, {&(0x7f0000005a00)=""/200, 0xc8}, {&(0x7f0000005b00)=""/4096, 0x1000}, {&(0x7f0000006b00)=""/49, 0x31}, {&(0x7f0000006b40)=""/160, 0xa0}], 0x6, &(0x7f0000006c80)=""/4096, 0x1000, 0x1ff}, 0x3}, {{&(0x7f0000007c80)=@pppol2tp, 0x80, &(0x7f0000007fc0)=[{&(0x7f0000007e00)=""/113, 0x71}, {&(0x7f0000007e80)=""/117, 0x75}, {&(0x7f0000007f00)=""/40, 0x28}, {&(0x7f0000007f40)=""/120, 0x78}], 0x4, 0x0, 0x0, 0x2a0}, 0x5}, {{&(0x7f0000008040)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000a2c0)=[{&(0x7f00000080c0)=""/4096, 0x1000}, {&(0x7f00000090c0)=""/188, 0xbc}, {&(0x7f0000009180)=""/90, 0x5a}, {&(0x7f0000009200)=""/4096, 0x1000}, {&(0x7f000000a200)=""/146, 0x92}], 0x5, &(0x7f000000a340)=""/193, 0xc1, 0x8}, 0x9}, {{&(0x7f000000a440)=@can, 0x80, &(0x7f000000b6c0)=[{&(0x7f000000a4c0)=""/4096, 0x1000}, {&(0x7f000000b4c0)=""/252, 0xfc}, {&(0x7f000000b5c0)=""/92, 0x5c}, {&(0x7f000000b640)=""/113, 0x71}], 0x4, &(0x7f000000b700)=""/13, 0xd}, 0x1f}, {{&(0x7f000000b740)=@ethernet, 0x80, &(0x7f000000b940)=[{&(0x7f000000b7c0)=""/164, 0xa4}, {&(0x7f000000b880)=""/120, 0x78}, {&(0x7f000000b900)=""/48, 0x30}], 0x3, 0x0, 0x0, 0x100000001}, 0x1}, {{&(0x7f000000b980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f000000cd40)=[{&(0x7f000000ba00)=""/4096, 0x1000}, {&(0x7f000000ca00)=""/37, 0x25}, {&(0x7f000000ca40)=""/224, 0xe0}, {&(0x7f000000cb40)=""/217, 0xd9}, {&(0x7f000000cc40)=""/216, 0xd8}], 0x5, &(0x7f000000cdc0)=""/58, 0x3a, 0x200}, 0x7}], 0x9, 0x40000000, 0x0) getsockname$packet(r0, &(0x7f000000d040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d080)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f000000d0c0)={{{@in=@rand_addr, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f000000d1c0)=0xe8) accept$packet(r0, &(0x7f000000d2c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d300)=0x14) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000ddc0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000000dd80)={&(0x7f000000d340)={0x1b0, r7, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r8}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0x10c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r13}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r14 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000100)) sendfile(r0, r14, &(0x7f0000d83ff8), 0x8000fffffffe) 03:35:42 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000440), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) munlockall() syz_extract_tcp_res$synack(&(0x7f00000004c0), 0x1, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) geteuid() lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000001580)) syz_execute_func(&(0x7f00000003c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:35:42 executing program 4: socket$inet(0x2, 0xfffffffffffffffe, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000009c0)=""/164) setns(0xffffffffffffffff, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ftruncate(0xffffffffffffffff, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000300), &(0x7f00000004c0)=0x18) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000500), 0x8) 03:35:42 executing program 5: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) seccomp(0x0, 0x0, &(0x7f0000000100)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x0, &(0x7f0000000740)=ANY=[], &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) 03:35:42 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) move_pages(r1, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000000c0), 0x0) 03:35:43 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000440), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) munlockall() syz_extract_tcp_res$synack(&(0x7f00000004c0), 0x1, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) geteuid() lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000001580)) syz_execute_func(&(0x7f00000003c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:35:43 executing program 1: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000804000)) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) move_pages(r1, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000000c0), 0x0) 03:35:43 executing program 1: pipe(&(0x7f0000000040)) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000004c0)={0x0, 0x1ed, &(0x7f0000000300)}, &(0x7f0000000500)=0x10) ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, &(0x7f0000000340)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000540), 0x8) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) inotify_init() shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") clock_gettime(0x0, &(0x7f0000000140)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000580)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x0, 0x0) 03:35:43 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000440), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) munlockall() syz_extract_tcp_res$synack(&(0x7f00000004c0), 0x1, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) geteuid() lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000001580)) syz_execute_func(&(0x7f00000003c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:35:43 executing program 3: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = creat(&(0x7f0000001380)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0, 0x19, 0x1, {0x400, {0x48, 0x4, 0x8}, 0x100, r2, r3, 0x5, 0x9, 0x400000000000000, 0x401, 0x5, 0x0, 0xff, 0x50000000000, 0x9, 0xfffffffffffffffd, 0x7ff, 0x5, 0xc11, 0x80b, 0xfff}}, 0xa0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r5 = accept(0xffffffffffffffff, &(0x7f0000000300)=@in={0x2, 0x0, @rand_addr}, &(0x7f00000000c0)=0x80) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r4, 0x0, 0x0, 0x1000f4) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') accept4(r4, &(0x7f00000004c0)=@xdp, &(0x7f0000000540)=0x80, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@mcast1, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@local, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@loopback, @in6=@ipv4}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000980)={0x0, @remote, @remote}, &(0x7f00000009c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000bc0)={'dummy0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000d40)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000dc0)=0x14) getsockopt$inet6_mreq(r5, 0x29, 0x15, &(0x7f0000001000)={@ipv4={[], [], @remote}}, &(0x7f0000001040)=0x14) getsockname$packet(r4, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001100)=0x14) accept$packet(r1, &(0x7f0000002640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002680)=0x14) getsockname$packet(r0, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002700)=0x14) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000002740)={0x0, @rand_addr, @rand_addr}, &(0x7f0000002780)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002800)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000002900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000002940)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002980)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000002a80)=0xe8) accept$packet(r4, &(0x7f0000002ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000002b40)={{{@in6=@mcast2, @in=@dev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000002c40)=0xe8) getpeername(r4, &(0x7f0000002c80)=@hci, &(0x7f0000002d00)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002d40)={{{@in=@multicast2, @in=@local}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000002e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002e80)={'team0\x00'}) getsockname(r0, &(0x7f0000002ec0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000002f40)=0x80) accept4$packet(r0, &(0x7f0000002f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002fc0)=0x14, 0x80000) recvmmsg(r1, &(0x7f000000ce00)=[{{&(0x7f0000003040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003180)=[{&(0x7f00000030c0)=""/57, 0x39}, {&(0x7f0000003100)=""/115, 0x73}], 0x2, &(0x7f00000031c0)=""/1, 0x1, 0x5}, 0x4}, {{&(0x7f0000003200)=@nfc, 0x80, &(0x7f0000005280)=[{&(0x7f0000003280)=""/4096, 0x1000}, {&(0x7f0000004280)=""/4096, 0x1000}], 0x2, &(0x7f00000052c0)=""/80, 0x50, 0x9}}, {{&(0x7f0000005340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000005740)=[{&(0x7f00000053c0)=""/94, 0x5e}, {&(0x7f0000005440)=""/230, 0xe6}, {&(0x7f0000005540)=""/86, 0x56}, {&(0x7f00000055c0)=""/4, 0x4}, {&(0x7f0000005600)=""/60, 0x3c}, {&(0x7f0000005640)=""/198, 0xc6}], 0x6, 0x0, 0x0, 0x1}, 0x3a}, {{&(0x7f00000057c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000006c00)=[{&(0x7f0000005840)=""/227, 0xe3}, {&(0x7f0000005940)=""/186, 0xba}, {&(0x7f0000005a00)=""/200, 0xc8}, {&(0x7f0000005b00)=""/4096, 0x1000}, {&(0x7f0000006b00)=""/49, 0x31}, {&(0x7f0000006b40)=""/160, 0xa0}], 0x6, &(0x7f0000006c80)=""/4096, 0x1000, 0x1ff}, 0x3}, {{&(0x7f0000007c80)=@pppol2tp, 0x80, &(0x7f0000007fc0)=[{&(0x7f0000007e00)=""/113, 0x71}, {&(0x7f0000007e80)=""/117, 0x75}, {&(0x7f0000007f00)=""/40, 0x28}, {&(0x7f0000007f40)=""/120, 0x78}], 0x4, 0x0, 0x0, 0x2a0}, 0x5}, {{&(0x7f0000008040)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000a2c0)=[{&(0x7f00000080c0)=""/4096, 0x1000}, {&(0x7f00000090c0)=""/188, 0xbc}, {&(0x7f0000009180)=""/90, 0x5a}, {&(0x7f0000009200)=""/4096, 0x1000}, {&(0x7f000000a200)=""/146, 0x92}], 0x5, &(0x7f000000a340)=""/193, 0xc1, 0x8}, 0x9}, {{&(0x7f000000a440)=@can, 0x80, &(0x7f000000b6c0)=[{&(0x7f000000a4c0)=""/4096, 0x1000}, {&(0x7f000000b4c0)=""/252, 0xfc}, {&(0x7f000000b5c0)=""/92, 0x5c}, {&(0x7f000000b640)=""/113, 0x71}], 0x4, &(0x7f000000b700)=""/13, 0xd}, 0x1f}, {{&(0x7f000000b740)=@ethernet, 0x80, &(0x7f000000b940)=[{&(0x7f000000b7c0)=""/164, 0xa4}, {&(0x7f000000b880)=""/120, 0x78}, {&(0x7f000000b900)=""/48, 0x30}], 0x3, 0x0, 0x0, 0x100000001}, 0x1}, {{&(0x7f000000b980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f000000cd40)=[{&(0x7f000000ba00)=""/4096, 0x1000}, {&(0x7f000000ca00)=""/37, 0x25}, {&(0x7f000000ca40)=""/224, 0xe0}, {&(0x7f000000cb40)=""/217, 0xd9}, {&(0x7f000000cc40)=""/216, 0xd8}], 0x5, &(0x7f000000cdc0)=""/58, 0x3a, 0x200}, 0x7}], 0x9, 0x40000000, 0x0) getsockname$packet(r0, &(0x7f000000d040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d080)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f000000d0c0)={{{@in=@rand_addr, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f000000d1c0)=0xe8) accept$packet(r0, &(0x7f000000d2c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d300)=0x14) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000ddc0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000000dd80)={&(0x7f000000d340)={0x1b0, r7, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r8}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0x10c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r13}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r14 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000100)) sendfile(r0, r14, &(0x7f0000d83ff8), 0x8000fffffffe) 03:35:43 executing program 2: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = creat(&(0x7f0000001380)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0, 0x19, 0x1, {0x400, {0x48, 0x4, 0x8}, 0x100, r2, r3, 0x5, 0x9, 0x400000000000000, 0x401, 0x5, 0x0, 0xff, 0x50000000000, 0x9, 0xfffffffffffffffd, 0x7ff, 0x5, 0xc11, 0x80b, 0xfff}}, 0xa0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r5 = accept(0xffffffffffffffff, &(0x7f0000000300)=@in={0x2, 0x0, @rand_addr}, &(0x7f00000000c0)=0x80) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r4, 0x0, 0x0, 0x1000f4) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') accept4(r4, &(0x7f00000004c0)=@xdp, &(0x7f0000000540)=0x80, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@mcast1, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@local, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@loopback, @in6=@ipv4}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000980)={0x0, @remote, @remote}, &(0x7f00000009c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000bc0)={'dummy0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000d40)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000dc0)=0x14) getsockopt$inet6_mreq(r5, 0x29, 0x15, &(0x7f0000001000)={@ipv4={[], [], @remote}}, &(0x7f0000001040)=0x14) getsockname$packet(r4, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001100)=0x14) accept$packet(r1, &(0x7f0000002640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002680)=0x14) getsockname$packet(r0, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002700)=0x14) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000002740)={0x0, @rand_addr, @rand_addr}, &(0x7f0000002780)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002800)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000002900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000002940)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002980)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000002a80)=0xe8) accept$packet(r4, &(0x7f0000002ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000002b40)={{{@in6=@mcast2, @in=@dev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000002c40)=0xe8) getpeername(r4, &(0x7f0000002c80)=@hci, &(0x7f0000002d00)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002d40)={{{@in=@multicast2, @in=@local}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000002e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002e80)={'team0\x00'}) getsockname(r0, &(0x7f0000002ec0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000002f40)=0x80) accept4$packet(r0, &(0x7f0000002f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002fc0)=0x14, 0x80000) recvmmsg(r1, &(0x7f000000ce00)=[{{&(0x7f0000003040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003180)=[{&(0x7f00000030c0)=""/57, 0x39}, {&(0x7f0000003100)=""/115, 0x73}], 0x2, &(0x7f00000031c0)=""/1, 0x1, 0x5}, 0x4}, {{&(0x7f0000003200)=@nfc, 0x80, &(0x7f0000005280)=[{&(0x7f0000003280)=""/4096, 0x1000}, {&(0x7f0000004280)=""/4096, 0x1000}], 0x2, &(0x7f00000052c0)=""/80, 0x50, 0x9}}, {{&(0x7f0000005340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000005740)=[{&(0x7f00000053c0)=""/94, 0x5e}, {&(0x7f0000005440)=""/230, 0xe6}, {&(0x7f0000005540)=""/86, 0x56}, {&(0x7f00000055c0)=""/4, 0x4}, {&(0x7f0000005600)=""/60, 0x3c}, {&(0x7f0000005640)=""/198, 0xc6}], 0x6, 0x0, 0x0, 0x1}, 0x3a}, {{&(0x7f00000057c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000006c00)=[{&(0x7f0000005840)=""/227, 0xe3}, {&(0x7f0000005940)=""/186, 0xba}, {&(0x7f0000005a00)=""/200, 0xc8}, {&(0x7f0000005b00)=""/4096, 0x1000}, {&(0x7f0000006b00)=""/49, 0x31}, {&(0x7f0000006b40)=""/160, 0xa0}], 0x6, &(0x7f0000006c80)=""/4096, 0x1000, 0x1ff}, 0x3}, {{&(0x7f0000007c80)=@pppol2tp, 0x80, &(0x7f0000007fc0)=[{&(0x7f0000007e00)=""/113, 0x71}, {&(0x7f0000007e80)=""/117, 0x75}, {&(0x7f0000007f00)=""/40, 0x28}, {&(0x7f0000007f40)=""/120, 0x78}], 0x4, 0x0, 0x0, 0x2a0}, 0x5}, {{&(0x7f0000008040)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000a2c0)=[{&(0x7f00000080c0)=""/4096, 0x1000}, {&(0x7f00000090c0)=""/188, 0xbc}, {&(0x7f0000009180)=""/90, 0x5a}, {&(0x7f0000009200)=""/4096, 0x1000}, {&(0x7f000000a200)=""/146, 0x92}], 0x5, &(0x7f000000a340)=""/193, 0xc1, 0x8}, 0x9}, {{&(0x7f000000a440)=@can, 0x80, &(0x7f000000b6c0)=[{&(0x7f000000a4c0)=""/4096, 0x1000}, {&(0x7f000000b4c0)=""/252, 0xfc}, {&(0x7f000000b5c0)=""/92, 0x5c}, {&(0x7f000000b640)=""/113, 0x71}], 0x4, &(0x7f000000b700)=""/13, 0xd}, 0x1f}, {{&(0x7f000000b740)=@ethernet, 0x80, &(0x7f000000b940)=[{&(0x7f000000b7c0)=""/164, 0xa4}, {&(0x7f000000b880)=""/120, 0x78}, {&(0x7f000000b900)=""/48, 0x30}], 0x3, 0x0, 0x0, 0x100000001}, 0x1}, {{&(0x7f000000b980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f000000cd40)=[{&(0x7f000000ba00)=""/4096, 0x1000}, {&(0x7f000000ca00)=""/37, 0x25}, {&(0x7f000000ca40)=""/224, 0xe0}, {&(0x7f000000cb40)=""/217, 0xd9}, {&(0x7f000000cc40)=""/216, 0xd8}], 0x5, &(0x7f000000cdc0)=""/58, 0x3a, 0x200}, 0x7}], 0x9, 0x40000000, 0x0) getsockname$packet(r0, &(0x7f000000d040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d080)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f000000d0c0)={{{@in=@rand_addr, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f000000d1c0)=0xe8) accept$packet(r0, &(0x7f000000d2c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d300)=0x14) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000ddc0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000000dd80)={&(0x7f000000d340)={0x1b0, r7, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r8}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0x10c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r13}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r14 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000100)) sendfile(r0, r14, &(0x7f0000d83ff8), 0x8000fffffffe) 03:35:43 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28021) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f00000001c0), 0xc, &(0x7f0000001400)={&(0x7f0000000f80)=ANY=[@ANYBLOB="3c00010024000100757365725f6c696e6b75700000000000000000000000000000000000000000000800030006000000040004"], 0x1}}, 0x0) write$evdev(r0, &(0x7f0000000040)=[{}, {{0x0, 0x7530}}], 0xff3e) 03:35:43 executing program 4: socket$inet(0x2, 0xfffffffffffffffe, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000009c0)=""/164) setns(0xffffffffffffffff, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ftruncate(0xffffffffffffffff, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000300), &(0x7f00000004c0)=0x18) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000500), 0x8) 03:35:43 executing program 5: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) seccomp(0x0, 0x0, &(0x7f0000000100)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x0, &(0x7f0000000740)=ANY=[], &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) 03:35:44 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28021) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f00000001c0), 0xc, &(0x7f0000001400)={&(0x7f0000000f80)=ANY=[@ANYBLOB="3c00010024000100757365725f6c696e6b75700000000000000000000000000000000000000000000800030006000000040004"], 0x1}}, 0x0) write$evdev(r0, &(0x7f0000000040)=[{}, {{0x0, 0x7530}}], 0xff3e) 03:35:44 executing program 3: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = creat(&(0x7f0000001380)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0, 0x19, 0x1, {0x400, {0x48, 0x4, 0x8}, 0x100, r2, r3, 0x5, 0x9, 0x400000000000000, 0x401, 0x5, 0x0, 0xff, 0x50000000000, 0x9, 0xfffffffffffffffd, 0x7ff, 0x5, 0xc11, 0x80b, 0xfff}}, 0xa0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r5 = accept(0xffffffffffffffff, &(0x7f0000000300)=@in={0x2, 0x0, @rand_addr}, &(0x7f00000000c0)=0x80) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r4, 0x0, 0x0, 0x1000f4) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') accept4(r4, &(0x7f00000004c0)=@xdp, &(0x7f0000000540)=0x80, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@mcast1, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@local, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@loopback, @in6=@ipv4}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000980)={0x0, @remote, @remote}, &(0x7f00000009c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000bc0)={'dummy0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000d40)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000dc0)=0x14) getsockopt$inet6_mreq(r5, 0x29, 0x15, &(0x7f0000001000)={@ipv4={[], [], @remote}}, &(0x7f0000001040)=0x14) getsockname$packet(r4, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001100)=0x14) accept$packet(r1, &(0x7f0000002640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002680)=0x14) getsockname$packet(r0, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002700)=0x14) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000002740)={0x0, @rand_addr, @rand_addr}, &(0x7f0000002780)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002800)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000002900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000002940)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002980)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000002a80)=0xe8) accept$packet(r4, &(0x7f0000002ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000002b40)={{{@in6=@mcast2, @in=@dev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000002c40)=0xe8) getpeername(r4, &(0x7f0000002c80)=@hci, &(0x7f0000002d00)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002d40)={{{@in=@multicast2, @in=@local}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000002e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002e80)={'team0\x00'}) getsockname(r0, &(0x7f0000002ec0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000002f40)=0x80) accept4$packet(r0, &(0x7f0000002f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002fc0)=0x14, 0x80000) recvmmsg(r1, &(0x7f000000ce00)=[{{&(0x7f0000003040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003180)=[{&(0x7f00000030c0)=""/57, 0x39}, {&(0x7f0000003100)=""/115, 0x73}], 0x2, &(0x7f00000031c0)=""/1, 0x1, 0x5}, 0x4}, {{&(0x7f0000003200)=@nfc, 0x80, &(0x7f0000005280)=[{&(0x7f0000003280)=""/4096, 0x1000}, {&(0x7f0000004280)=""/4096, 0x1000}], 0x2, &(0x7f00000052c0)=""/80, 0x50, 0x9}}, {{&(0x7f0000005340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000005740)=[{&(0x7f00000053c0)=""/94, 0x5e}, {&(0x7f0000005440)=""/230, 0xe6}, {&(0x7f0000005540)=""/86, 0x56}, {&(0x7f00000055c0)=""/4, 0x4}, {&(0x7f0000005600)=""/60, 0x3c}, {&(0x7f0000005640)=""/198, 0xc6}], 0x6, 0x0, 0x0, 0x1}, 0x3a}, {{&(0x7f00000057c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000006c00)=[{&(0x7f0000005840)=""/227, 0xe3}, {&(0x7f0000005940)=""/186, 0xba}, {&(0x7f0000005a00)=""/200, 0xc8}, {&(0x7f0000005b00)=""/4096, 0x1000}, {&(0x7f0000006b00)=""/49, 0x31}, {&(0x7f0000006b40)=""/160, 0xa0}], 0x6, &(0x7f0000006c80)=""/4096, 0x1000, 0x1ff}, 0x3}, {{&(0x7f0000007c80)=@pppol2tp, 0x80, &(0x7f0000007fc0)=[{&(0x7f0000007e00)=""/113, 0x71}, {&(0x7f0000007e80)=""/117, 0x75}, {&(0x7f0000007f00)=""/40, 0x28}, {&(0x7f0000007f40)=""/120, 0x78}], 0x4, 0x0, 0x0, 0x2a0}, 0x5}, {{&(0x7f0000008040)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000a2c0)=[{&(0x7f00000080c0)=""/4096, 0x1000}, {&(0x7f00000090c0)=""/188, 0xbc}, {&(0x7f0000009180)=""/90, 0x5a}, {&(0x7f0000009200)=""/4096, 0x1000}, {&(0x7f000000a200)=""/146, 0x92}], 0x5, &(0x7f000000a340)=""/193, 0xc1, 0x8}, 0x9}, {{&(0x7f000000a440)=@can, 0x80, &(0x7f000000b6c0)=[{&(0x7f000000a4c0)=""/4096, 0x1000}, {&(0x7f000000b4c0)=""/252, 0xfc}, {&(0x7f000000b5c0)=""/92, 0x5c}, {&(0x7f000000b640)=""/113, 0x71}], 0x4, &(0x7f000000b700)=""/13, 0xd}, 0x1f}, {{&(0x7f000000b740)=@ethernet, 0x80, &(0x7f000000b940)=[{&(0x7f000000b7c0)=""/164, 0xa4}, {&(0x7f000000b880)=""/120, 0x78}, {&(0x7f000000b900)=""/48, 0x30}], 0x3, 0x0, 0x0, 0x100000001}, 0x1}, {{&(0x7f000000b980)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f000000cd40)=[{&(0x7f000000ba00)=""/4096, 0x1000}, {&(0x7f000000ca00)=""/37, 0x25}, {&(0x7f000000ca40)=""/224, 0xe0}, {&(0x7f000000cb40)=""/217, 0xd9}, {&(0x7f000000cc40)=""/216, 0xd8}], 0x5, &(0x7f000000cdc0)=""/58, 0x3a, 0x200}, 0x7}], 0x9, 0x40000000, 0x0) getsockname$packet(r0, &(0x7f000000d040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d080)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f000000d0c0)={{{@in=@rand_addr, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f000000d1c0)=0xe8) accept$packet(r0, &(0x7f000000d2c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d300)=0x14) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000ddc0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000000dd80)={&(0x7f000000d340)={0x1b0, r7, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r8}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0x10c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r13}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r14 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000100)) sendfile(r0, r14, &(0x7f0000d83ff8), 0x8000fffffffe) 03:35:44 executing program 1: pipe(&(0x7f0000000040)) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000004c0)={0x0, 0x1ed, &(0x7f0000000300)}, &(0x7f0000000500)=0x10) ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, &(0x7f0000000340)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000540), 0x8) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) inotify_init() shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") clock_gettime(0x0, &(0x7f0000000140)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000580)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x0, 0x0) 03:35:44 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28021) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f00000001c0), 0xc, &(0x7f0000001400)={&(0x7f0000000f80)=ANY=[@ANYBLOB="3c00010024000100757365725f6c696e6b75700000000000000000000000000000000000000000000800030006000000040004"], 0x1}}, 0x0) write$evdev(r0, &(0x7f0000000040)=[{}, {{0x0, 0x7530}}], 0xff3e) 03:35:44 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000eff0)=[{&(0x7f0000010000)="240000001900030007ff0907000083be8020000000040005031d85680300a3a2d188737e", 0x24}], 0x1}, 0x0) 03:35:44 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000eff0)=[{&(0x7f0000010000)="240000001900030007ff0907000083be8020000000040005031d85680300a3a2d188737e", 0x24}], 0x1}, 0x0) 03:35:44 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000eff0)=[{&(0x7f0000010000)="240000001900030007ff0907000083be8020000000040005031d85680300a3a2d188737e", 0x24}], 0x1}, 0x0) 03:35:44 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28021) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f00000001c0), 0xc, &(0x7f0000001400)={&(0x7f0000000f80)=ANY=[@ANYBLOB="3c00010024000100757365725f6c696e6b75700000000000000000000000000000000000000000000800030006000000040004"], 0x1}}, 0x0) write$evdev(r0, &(0x7f0000000040)=[{}, {{0x0, 0x7530}}], 0xff3e) 03:35:44 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x201) ppoll(&(0x7f0000000040)=[{r0}], 0xf, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x8) 03:35:44 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x201) ppoll(&(0x7f0000000040)=[{r0}], 0xf, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x8) 03:35:44 executing program 4: socket$inet(0x2, 0xfffffffffffffffe, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000009c0)=""/164) setns(0xffffffffffffffff, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x2308ba72b838fcbe) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ftruncate(0xffffffffffffffff, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000300), &(0x7f00000004c0)=0x18) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000500), 0x8) 03:35:44 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000eff0)=[{&(0x7f0000010000)="240000001900030007ff0907000083be8020000000040005031d85680300a3a2d188737e", 0x24}], 0x1}, 0x0) 03:35:44 executing program 5: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) seccomp(0x0, 0x0, &(0x7f0000000100)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x0, &(0x7f0000000740)=ANY=[], &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) 03:35:45 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x201) ppoll(&(0x7f0000000040)=[{r0}], 0xf, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x8) 03:35:45 executing program 1: pipe(&(0x7f0000000040)) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000004c0)={0x0, 0x1ed, &(0x7f0000000300)}, &(0x7f0000000500)=0x10) ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, &(0x7f0000000340)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000540), 0x8) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) inotify_init() shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") clock_gettime(0x0, &(0x7f0000000140)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000580)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x0, 0x0) 03:35:45 executing program 0: r0 = timerfd_create(0x0, 0x0) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0x40085400, &(0x7f0000000080)={0x1ff}) 03:35:45 executing program 2: clock_gettime(0x2, &(0x7f0000000380)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) splice(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000001c0)) syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') fremovexattr(0xffffffffffffffff, &(0x7f0000000200)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a6412fafa9086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") clock_getres(0x0, &(0x7f0000000240)) msgget$private(0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000280)=""/56) 03:35:45 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x201) ppoll(&(0x7f0000000040)=[{r0}], 0xf, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x8) 03:35:45 executing program 3: recvmsg(0xffffffffffffff9c, &(0x7f0000000800)={&(0x7f0000000080)=@pppol2tpv3in6, 0x80, &(0x7f0000000780), 0x0, &(0x7f0000000200)=""/15, 0xf}, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000840)={@multicast2, @remote}, &(0x7f0000000880)=0x8) keyctl$set_reqkey_keyring(0x17, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000008c0)={'security\x00', 0x2, [{}, {}]}, 0x48) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000380)={0x0, 0x0, 0x0, {0x77359400}}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000001c0)) delete_module(&(0x7f0000000340)='),bdev-vmnet0!\x00', 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:45 executing program 0: r0 = timerfd_create(0x0, 0x0) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0x40085400, &(0x7f0000000080)={0x1ff}) 03:35:45 executing program 0: r0 = timerfd_create(0x0, 0x0) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0x40085400, &(0x7f0000000080)={0x1ff}) 03:35:45 executing program 0: r0 = timerfd_create(0x0, 0x0) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0x40085400, &(0x7f0000000080)={0x1ff}) 03:35:45 executing program 5: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) seccomp(0x0, 0x0, &(0x7f0000000100)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x0, &(0x7f0000000740)=ANY=[], &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) 03:35:45 executing program 0: clock_gettime(0x8afffffd, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) getresuid(&(0x7f00000005c0), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000180)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000a80)=0xe8) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in=@local, @in6=@remote}}, {{}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) getpid() geteuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) getpgrp(0xffffffffffffffff) geteuid() getegid() gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001180)) openat$urandom(0xffffffffffffff9c, &(0x7f0000001400)='/dev/urandom\x00', 0x0, 0x0) getpid() lstat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in, @in6=@ipv4={[], [], @local}}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001b80)=0xe8) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003100)) geteuid() stat(&(0x7f0000003140)='./file0\x00', &(0x7f0000003180)) getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003a80)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000003b80)=0xe8) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003bc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003c00)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000003d00)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000003e40)=0xe8) getresgid(&(0x7f0000003e80), &(0x7f0000003ec0), &(0x7f0000003f00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003f40)) getresuid(&(0x7f0000003f80), &(0x7f0000003fc0), &(0x7f0000004000)) getgroups(0x0, &(0x7f0000004040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000042c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f00000043c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004400)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004480)={{{@in6=@ipv4={[], [], @multicast1}, @in=@remote}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000004580)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000045c0), &(0x7f0000004600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004640), &(0x7f0000004680)=0xc) stat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000047c0)={{{@in=@multicast1, @in6}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000048c0)=0xe8) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000049c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a00), &(0x7f0000004a40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000004a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004f40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004f80)={{{@in6=@ipv4={[], [], @remote}, @in6=@remote}}, {{}, 0x0, @in6=@local}}, &(0x7f0000005080)=0xe8) stat(&(0x7f00000050c0)='./file0\x00', &(0x7f0000005100)) getpid() geteuid() getresgid(&(0x7f0000005180), &(0x7f00000051c0), &(0x7f0000005200)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005240)) fstat(0xffffffffffffffff, &(0x7f0000005280)) stat(&(0x7f0000005300)='./file0\x00', &(0x7f0000005340)) 03:35:45 executing program 4: keyctl$set_reqkey_keyring(0xd, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:46 executing program 2: clock_gettime(0x2, &(0x7f0000000380)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) splice(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000001c0)) syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') fremovexattr(0xffffffffffffffff, &(0x7f0000000200)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a6412fafa9086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") clock_getres(0x0, &(0x7f0000000240)) msgget$private(0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000280)=""/56) 03:35:46 executing program 1: pipe(&(0x7f0000000040)) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000004c0)={0x0, 0x1ed, &(0x7f0000000300)}, &(0x7f0000000500)=0x10) ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, &(0x7f0000000340)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000540), 0x8) signalfd(0xffffffffffffffff, &(0x7f0000000300), 0x8) inotify_init() shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") clock_gettime(0x0, &(0x7f0000000140)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000580)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x0, 0x0) 03:35:46 executing program 3: recvmsg(0xffffffffffffff9c, &(0x7f0000000800)={&(0x7f0000000080)=@pppol2tpv3in6, 0x80, &(0x7f0000000780), 0x0, &(0x7f0000000200)=""/15, 0xf}, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000840)={@multicast2, @remote}, &(0x7f0000000880)=0x8) keyctl$set_reqkey_keyring(0x17, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000008c0)={'security\x00', 0x2, [{}, {}]}, 0x48) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000380)={0x0, 0x0, 0x0, {0x77359400}}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000001c0)) delete_module(&(0x7f0000000340)='),bdev-vmnet0!\x00', 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:46 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000040)='\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000080)}}, &(0x7f0000000300)) timer_gettime(0x0, &(0x7f0000000980)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000080)) accept(0xffffffffffffffff, &(0x7f0000000480)=@alg, &(0x7f0000000240)=0x80) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000600)={'nat\x00', 0x0, 0x0, 0xe6, [], 0x0, &(0x7f0000000440), &(0x7f0000000500)=""/230}, &(0x7f00000002c0)=0x78) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="1fc143293cadc68a72668d05168a12d7", 0x10) socket$inet6_udplite(0xa, 0x2, 0x88) 03:35:46 executing program 0: clock_gettime(0x8afffffd, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) getresuid(&(0x7f00000005c0), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000180)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000a80)=0xe8) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in=@local, @in6=@remote}}, {{}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) getpid() geteuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) getpgrp(0xffffffffffffffff) geteuid() getegid() gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001180)) openat$urandom(0xffffffffffffff9c, &(0x7f0000001400)='/dev/urandom\x00', 0x0, 0x0) getpid() lstat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in, @in6=@ipv4={[], [], @local}}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001b80)=0xe8) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003100)) geteuid() stat(&(0x7f0000003140)='./file0\x00', &(0x7f0000003180)) getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003a80)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000003b80)=0xe8) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003bc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003c00)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000003d00)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000003e40)=0xe8) getresgid(&(0x7f0000003e80), &(0x7f0000003ec0), &(0x7f0000003f00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003f40)) getresuid(&(0x7f0000003f80), &(0x7f0000003fc0), &(0x7f0000004000)) getgroups(0x0, &(0x7f0000004040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000042c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f00000043c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004400)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004480)={{{@in6=@ipv4={[], [], @multicast1}, @in=@remote}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000004580)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000045c0), &(0x7f0000004600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004640), &(0x7f0000004680)=0xc) stat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000047c0)={{{@in=@multicast1, @in6}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000048c0)=0xe8) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000049c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a00), &(0x7f0000004a40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000004a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004f40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004f80)={{{@in6=@ipv4={[], [], @remote}, @in6=@remote}}, {{}, 0x0, @in6=@local}}, &(0x7f0000005080)=0xe8) stat(&(0x7f00000050c0)='./file0\x00', &(0x7f0000005100)) getpid() geteuid() getresgid(&(0x7f0000005180), &(0x7f00000051c0), &(0x7f0000005200)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005240)) fstat(0xffffffffffffffff, &(0x7f0000005280)) stat(&(0x7f0000005300)='./file0\x00', &(0x7f0000005340)) 03:35:46 executing program 4: keyctl$set_reqkey_keyring(0xd, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:46 executing program 2: clock_gettime(0x2, &(0x7f0000000380)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) splice(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000001c0)) syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') fremovexattr(0xffffffffffffffff, &(0x7f0000000200)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a6412fafa9086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") clock_getres(0x0, &(0x7f0000000240)) msgget$private(0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000280)=""/56) 03:35:47 executing program 1: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 03:35:47 executing program 3: recvmsg(0xffffffffffffff9c, &(0x7f0000000800)={&(0x7f0000000080)=@pppol2tpv3in6, 0x80, &(0x7f0000000780), 0x0, &(0x7f0000000200)=""/15, 0xf}, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000840)={@multicast2, @remote}, &(0x7f0000000880)=0x8) keyctl$set_reqkey_keyring(0x17, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000008c0)={'security\x00', 0x2, [{}, {}]}, 0x48) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000380)={0x0, 0x0, 0x0, {0x77359400}}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000001c0)) delete_module(&(0x7f0000000340)='),bdev-vmnet0!\x00', 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:47 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000040)='\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000080)}}, &(0x7f0000000300)) timer_gettime(0x0, &(0x7f0000000980)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000080)) accept(0xffffffffffffffff, &(0x7f0000000480)=@alg, &(0x7f0000000240)=0x80) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000600)={'nat\x00', 0x0, 0x0, 0xe6, [], 0x0, &(0x7f0000000440), &(0x7f0000000500)=""/230}, &(0x7f00000002c0)=0x78) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="1fc143293cadc68a72668d05168a12d7", 0x10) socket$inet6_udplite(0xa, 0x2, 0x88) 03:35:47 executing program 0: clock_gettime(0x8afffffd, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) getresuid(&(0x7f00000005c0), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000180)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000a80)=0xe8) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in=@local, @in6=@remote}}, {{}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) getpid() geteuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) getpgrp(0xffffffffffffffff) geteuid() getegid() gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001180)) openat$urandom(0xffffffffffffff9c, &(0x7f0000001400)='/dev/urandom\x00', 0x0, 0x0) getpid() lstat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in, @in6=@ipv4={[], [], @local}}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001b80)=0xe8) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003100)) geteuid() stat(&(0x7f0000003140)='./file0\x00', &(0x7f0000003180)) getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003a80)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000003b80)=0xe8) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003bc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003c00)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000003d00)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000003e40)=0xe8) getresgid(&(0x7f0000003e80), &(0x7f0000003ec0), &(0x7f0000003f00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003f40)) getresuid(&(0x7f0000003f80), &(0x7f0000003fc0), &(0x7f0000004000)) getgroups(0x0, &(0x7f0000004040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000042c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f00000043c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004400)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004480)={{{@in6=@ipv4={[], [], @multicast1}, @in=@remote}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000004580)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000045c0), &(0x7f0000004600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004640), &(0x7f0000004680)=0xc) stat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000047c0)={{{@in=@multicast1, @in6}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000048c0)=0xe8) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000049c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a00), &(0x7f0000004a40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000004a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004f40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004f80)={{{@in6=@ipv4={[], [], @remote}, @in6=@remote}}, {{}, 0x0, @in6=@local}}, &(0x7f0000005080)=0xe8) stat(&(0x7f00000050c0)='./file0\x00', &(0x7f0000005100)) getpid() geteuid() getresgid(&(0x7f0000005180), &(0x7f00000051c0), &(0x7f0000005200)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005240)) fstat(0xffffffffffffffff, &(0x7f0000005280)) stat(&(0x7f0000005300)='./file0\x00', &(0x7f0000005340)) 03:35:47 executing program 2: clock_gettime(0x2, &(0x7f0000000380)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) splice(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000001c0)) syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') fremovexattr(0xffffffffffffffff, &(0x7f0000000200)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a6412fafa9086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") clock_getres(0x0, &(0x7f0000000240)) msgget$private(0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000280)=""/56) 03:35:47 executing program 4: keyctl$set_reqkey_keyring(0xd, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:47 executing program 1: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 03:35:48 executing program 3: recvmsg(0xffffffffffffff9c, &(0x7f0000000800)={&(0x7f0000000080)=@pppol2tpv3in6, 0x80, &(0x7f0000000780), 0x0, &(0x7f0000000200)=""/15, 0xf}, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000840)={@multicast2, @remote}, &(0x7f0000000880)=0x8) keyctl$set_reqkey_keyring(0x17, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000008c0)={'security\x00', 0x2, [{}, {}]}, 0x48) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000380)={0x0, 0x0, 0x0, {0x77359400}}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000001c0)) delete_module(&(0x7f0000000340)='),bdev-vmnet0!\x00', 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:48 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000040)='\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000080)}}, &(0x7f0000000300)) timer_gettime(0x0, &(0x7f0000000980)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000080)) accept(0xffffffffffffffff, &(0x7f0000000480)=@alg, &(0x7f0000000240)=0x80) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000600)={'nat\x00', 0x0, 0x0, 0xe6, [], 0x0, &(0x7f0000000440), &(0x7f0000000500)=""/230}, &(0x7f00000002c0)=0x78) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="1fc143293cadc68a72668d05168a12d7", 0x10) socket$inet6_udplite(0xa, 0x2, 0x88) 03:35:48 executing program 0: clock_gettime(0x8afffffd, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) getresuid(&(0x7f00000005c0), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000180)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000a80)=0xe8) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in=@local, @in6=@remote}}, {{}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) getpid() geteuid() getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) getpgrp(0xffffffffffffffff) geteuid() getegid() gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001180)) openat$urandom(0xffffffffffffff9c, &(0x7f0000001400)='/dev/urandom\x00', 0x0, 0x0) getpid() lstat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in, @in6=@ipv4={[], [], @local}}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001b80)=0xe8) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003100)) geteuid() stat(&(0x7f0000003140)='./file0\x00', &(0x7f0000003180)) getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003a80)={{{@in6, @in6}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000003b80)=0xe8) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003bc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003c00)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000003d00)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000003e40)=0xe8) getresgid(&(0x7f0000003e80), &(0x7f0000003ec0), &(0x7f0000003f00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003f40)) getresuid(&(0x7f0000003f80), &(0x7f0000003fc0), &(0x7f0000004000)) getgroups(0x0, &(0x7f0000004040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000042c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f00000043c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004400)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004480)={{{@in6=@ipv4={[], [], @multicast1}, @in=@remote}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000004580)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000045c0), &(0x7f0000004600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004640), &(0x7f0000004680)=0xc) stat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000047c0)={{{@in=@multicast1, @in6}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000048c0)=0xe8) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000049c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a00), &(0x7f0000004a40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000004a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004f40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004f80)={{{@in6=@ipv4={[], [], @remote}, @in6=@remote}}, {{}, 0x0, @in6=@local}}, &(0x7f0000005080)=0xe8) stat(&(0x7f00000050c0)='./file0\x00', &(0x7f0000005100)) getpid() geteuid() getresgid(&(0x7f0000005180), &(0x7f00000051c0), &(0x7f0000005200)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005240)) fstat(0xffffffffffffffff, &(0x7f0000005280)) stat(&(0x7f0000005300)='./file0\x00', &(0x7f0000005340)) 03:35:48 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='g'], 0x1) mmap(&(0x7f0000007000/0x6000)=nil, 0x6000, 0x100000a, 0x2013, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:35:48 executing program 4: keyctl$set_reqkey_keyring(0xd, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:48 executing program 1: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 03:35:48 executing program 3: keyctl$invalidate(0x7, 0x0) clock_gettime(0x4, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000000080)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) ioprio_get$pid(0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='devpts\x00', 0xffffffffffffff9c}, 0x10) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="bb7dae199ab91e076588155601edad51660a0d920be297f185503f74eae07fed5f7ef1dfd2fee4aa48859273"], &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, &(0x7f00000001c0)="26652481584b25d7e49ce3c1998e2f7d6952d50b405ae1d8e80be68793d261365ad3414f25dadbfb240fb91f51772e484f6f2dca5fcafffe851ceb24bb0fa55a405dad743bf39589287c9eb8438936db890de07d2944ee7f92f282e3433fcc13ce88d75210877ea5ff1b50ef714880f06d19ec1210e6163307344994682128192ebcad780783b498e39d9f1e7d27ccf573820ba8b2c4f524184f2c33ec5a8e5735cffe3ed93d") geteuid() geteuid() setreuid(0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000191000), &(0x7f0000000300), 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) set_mempolicy(0x4002, &(0x7f0000000500)=0x3, 0x3ff) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) modify_ldt$read(0x0, &(0x7f0000000400)=""/216, 0xd8) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[]) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000240)) 03:35:49 executing program 2: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") [ 1890.523008] devpts: called with bogus options 03:35:49 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000040)='\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000080)}}, &(0x7f0000000300)) timer_gettime(0x0, &(0x7f0000000980)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000080)) accept(0xffffffffffffffff, &(0x7f0000000480)=@alg, &(0x7f0000000240)=0x80) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000600)={'nat\x00', 0x0, 0x0, 0xe6, [], 0x0, &(0x7f0000000440), &(0x7f0000000500)=""/230}, &(0x7f00000002c0)=0x78) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000000c0)="1fc143293cadc68a72668d05168a12d7", 0x10) socket$inet6_udplite(0xa, 0x2, 0x88) 03:35:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) close(r0) 03:35:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) close(r0) 03:35:49 executing program 1: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000900)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 03:35:49 executing program 4: futex(&(0x7f00000000c0), 0x5, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000180), &(0x7f0000000200)=0x14) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)={0xd}, 0xd) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:49 executing program 3: keyctl$invalidate(0x7, 0x0) clock_gettime(0x4, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000000080)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) ioprio_get$pid(0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='devpts\x00', 0xffffffffffffff9c}, 0x10) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="bb7dae199ab91e076588155601edad51660a0d920be297f185503f74eae07fed5f7ef1dfd2fee4aa48859273"], &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, &(0x7f00000001c0)="26652481584b25d7e49ce3c1998e2f7d6952d50b405ae1d8e80be68793d261365ad3414f25dadbfb240fb91f51772e484f6f2dca5fcafffe851ceb24bb0fa55a405dad743bf39589287c9eb8438936db890de07d2944ee7f92f282e3433fcc13ce88d75210877ea5ff1b50ef714880f06d19ec1210e6163307344994682128192ebcad780783b498e39d9f1e7d27ccf573820ba8b2c4f524184f2c33ec5a8e5735cffe3ed93d") geteuid() geteuid() setreuid(0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000191000), &(0x7f0000000300), 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) set_mempolicy(0x4002, &(0x7f0000000500)=0x3, 0x3ff) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) modify_ldt$read(0x0, &(0x7f0000000400)=""/216, 0xd8) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[]) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000240)) 03:35:50 executing program 2: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) close(r0) 03:35:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) close(r0) [ 1891.611604] devpts: called with bogus options 03:35:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:50 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_buf(r1, 0x1, 0x1a, &(0x7f0000000080)=""/197, &(0x7f0000000000)=0xc5) 03:35:50 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_buf(r1, 0x1, 0x1a, &(0x7f0000000080)=""/197, &(0x7f0000000000)=0xc5) 03:35:50 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040), 0xfb01cbdd028b9044) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x17, &(0x7f0000000180), 0x8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_link_settings}) r1 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 03:35:50 executing program 4: futex(&(0x7f00000000c0), 0x5, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000180), &(0x7f0000000200)=0x14) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)={0xd}, 0xd) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:50 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_buf(r1, 0x1, 0x1a, &(0x7f0000000080)=""/197, &(0x7f0000000000)=0xc5) 03:35:50 executing program 3: keyctl$invalidate(0x7, 0x0) clock_gettime(0x4, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000000080)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) ioprio_get$pid(0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='devpts\x00', 0xffffffffffffff9c}, 0x10) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="bb7dae199ab91e076588155601edad51660a0d920be297f185503f74eae07fed5f7ef1dfd2fee4aa48859273"], &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, &(0x7f00000001c0)="26652481584b25d7e49ce3c1998e2f7d6952d50b405ae1d8e80be68793d261365ad3414f25dadbfb240fb91f51772e484f6f2dca5fcafffe851ceb24bb0fa55a405dad743bf39589287c9eb8438936db890de07d2944ee7f92f282e3433fcc13ce88d75210877ea5ff1b50ef714880f06d19ec1210e6163307344994682128192ebcad780783b498e39d9f1e7d27ccf573820ba8b2c4f524184f2c33ec5a8e5735cffe3ed93d") geteuid() geteuid() setreuid(0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000191000), &(0x7f0000000300), 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) set_mempolicy(0x4002, &(0x7f0000000500)=0x3, 0x3ff) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) modify_ldt$read(0x0, &(0x7f0000000400)=""/216, 0xd8) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[]) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000240)) 03:35:50 executing program 2: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:51 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$sock_buf(r1, 0x1, 0x1a, &(0x7f0000000080)=""/197, &(0x7f0000000000)=0xc5) 03:35:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:51 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040), 0xfb01cbdd028b9044) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x17, &(0x7f0000000180), 0x8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_link_settings}) r1 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") [ 1892.537203] devpts: called with bogus options 03:35:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:51 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040), 0xfb01cbdd028b9044) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x17, &(0x7f0000000180), 0x8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_link_settings}) r1 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 03:35:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:51 executing program 4: futex(&(0x7f00000000c0), 0x5, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000180), &(0x7f0000000200)=0x14) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)={0xd}, 0xd) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:51 executing program 3: keyctl$invalidate(0x7, 0x0) clock_gettime(0x4, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000000080)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) ioprio_get$pid(0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='devpts\x00', 0xffffffffffffff9c}, 0x10) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="bb7dae199ab91e076588155601edad51660a0d920be297f185503f74eae07fed5f7ef1dfd2fee4aa48859273"], &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, &(0x7f00000001c0)="26652481584b25d7e49ce3c1998e2f7d6952d50b405ae1d8e80be68793d261365ad3414f25dadbfb240fb91f51772e484f6f2dca5fcafffe851ceb24bb0fa55a405dad743bf39589287c9eb8438936db890de07d2944ee7f92f282e3433fcc13ce88d75210877ea5ff1b50ef714880f06d19ec1210e6163307344994682128192ebcad780783b498e39d9f1e7d27ccf573820ba8b2c4f524184f2c33ec5a8e5735cffe3ed93d") geteuid() geteuid() setreuid(0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000191000), &(0x7f0000000300), 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) set_mempolicy(0x4002, &(0x7f0000000500)=0x3, 0x3ff) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) modify_ldt$read(0x0, &(0x7f0000000400)=""/216, 0xd8) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[]) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000240)) 03:35:51 executing program 2: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:52 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040), 0xfb01cbdd028b9044) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x17, &(0x7f0000000180), 0x8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_link_settings}) r1 = socket$inet6(0xa, 0x80003, 0x5) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") [ 1893.497094] devpts: called with bogus options 03:35:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:52 executing program 4: futex(&(0x7f00000000c0), 0x5, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000180), &(0x7f0000000200)=0x14) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)={0xd}, 0xd) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 03:35:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 03:35:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 03:35:55 executing program 5: clock_gettime(0x800000008, &(0x7f0000000140)) syz_open_dev$rtc(&(0x7f0000000200)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="46805da06ebd260f70741181a5c4230cf961d055ce73fe19fa380f78b5c4417f1201f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e6f3420faedd0703") getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000180)=""/84, &(0x7f0000000100)=0x54) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x1d, 0x80000001, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 03:35:55 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000480)='/dev/snd/controlC#\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000500), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) getpgrp(0xffffffffffffffff) getpid() getpgrp(0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000640), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000380)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getresgid(&(0x7f0000000d40), &(0x7f0000000540), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) fstat(0xffffffffffffffff, &(0x7f00000015c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in6}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001740)=0xe8) lstat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000780)) geteuid() 03:35:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") close(r0) 03:35:55 executing program 1: keyctl$set_reqkey_keyring(0x2, 0x0) add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x0, 0xfffffffffffffffa) keyctl$setperm(0xa, 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") getegid() syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000200)=0xc) getuid() getpgrp(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000300)='pkcs7_test\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000000180)=@proc, 0xc, &(0x7f0000002000)}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) getpid() shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000780)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f0000000800)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) getresuid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="212aad919424"}, 0x14) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b80)) 03:35:55 executing program 5: clock_gettime(0x800000008, &(0x7f0000000140)) syz_open_dev$rtc(&(0x7f0000000200)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="46805da06ebd260f70741181a5c4230cf961d055ce73fe19fa380f78b5c4417f1201f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e6f3420faedd0703") getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000180)=""/84, &(0x7f0000000100)=0x54) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") close(r0) 03:35:55 executing program 5: clock_gettime(0x800000008, &(0x7f0000000140)) syz_open_dev$rtc(&(0x7f0000000200)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="46805da06ebd260f70741181a5c4230cf961d055ce73fe19fa380f78b5c4417f1201f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e6f3420faedd0703") getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000180)=""/84, &(0x7f0000000100)=0x54) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") close(r0) 03:35:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x400080, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000440)=0x14) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 03:35:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = socket$inet6(0xa, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") close(r0) 03:35:56 executing program 5: clock_gettime(0x800000008, &(0x7f0000000140)) syz_open_dev$rtc(&(0x7f0000000200)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="46805da06ebd260f70741181a5c4230cf961d055ce73fe19fa380f78b5c4417f1201f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e6f3420faedd0703") getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000180)=""/84, &(0x7f0000000100)=0x54) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:56 executing program 0: pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:35:56 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000480)='/dev/snd/controlC#\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000500), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) getpgrp(0xffffffffffffffff) getpid() getpgrp(0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000640), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000380)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getresgid(&(0x7f0000000d40), &(0x7f0000000540), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) fstat(0xffffffffffffffff, &(0x7f00000015c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in6}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001740)=0xe8) lstat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000780)) geteuid() 03:35:56 executing program 3: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000440)=""/224) select(0x40, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") pipe2$9p(&(0x7f0000000040), 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000001c0)) io_setup(0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:35:56 executing program 1: keyctl$set_reqkey_keyring(0x2, 0x0) add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x0, 0xfffffffffffffffa) keyctl$setperm(0xa, 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") getegid() syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000200)=0xc) getuid() getpgrp(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000300)='pkcs7_test\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000000180)=@proc, 0xc, &(0x7f0000002000)}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) getpid() shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000780)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f0000000800)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) getresuid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="212aad919424"}, 0x14) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b80)) 03:35:56 executing program 5: msync(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) times(&(0x7f0000000080)) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a00)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") memfd_create(&(0x7f0000000040)="8f6b657972696e672f2700", 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000008c0)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000009c0)=0x84) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)={'\x00', @ifru_addrs=@can}) syz_execute_func(&(0x7f00000003c0)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:35:56 executing program 2: keyctl$set_reqkey_keyring(0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:56 executing program 3: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000440)=""/224) select(0x40, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") pipe2$9p(&(0x7f0000000040), 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000001c0)) io_setup(0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:35:56 executing program 5: msync(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) times(&(0x7f0000000080)) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a00)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") memfd_create(&(0x7f0000000040)="8f6b657972696e672f2700", 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000008c0)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000009c0)=0x84) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)={'\x00', @ifru_addrs=@can}) syz_execute_func(&(0x7f00000003c0)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:35:57 executing program 3: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000440)=""/224) select(0x40, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") pipe2$9p(&(0x7f0000000040), 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000001c0)) io_setup(0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:35:57 executing program 5: msync(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) times(&(0x7f0000000080)) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a00)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") memfd_create(&(0x7f0000000040)="8f6b657972696e672f2700", 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000008c0)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000009c0)=0x84) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)={'\x00', @ifru_addrs=@can}) syz_execute_func(&(0x7f00000003c0)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:35:57 executing program 0: pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:35:57 executing program 3: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000440)=""/224) select(0x40, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") pipe2$9p(&(0x7f0000000040), 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000001c0)) io_setup(0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:35:57 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000480)='/dev/snd/controlC#\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000500), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) getpgrp(0xffffffffffffffff) getpid() getpgrp(0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000640), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000380)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getresgid(&(0x7f0000000d40), &(0x7f0000000540), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) fstat(0xffffffffffffffff, &(0x7f00000015c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in6}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001740)=0xe8) lstat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000780)) geteuid() 03:35:57 executing program 5: msync(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) times(&(0x7f0000000080)) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a00)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") memfd_create(&(0x7f0000000040)="8f6b657972696e672f2700", 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000008c0)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000009c0)=0x84) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)={'\x00', @ifru_addrs=@can}) syz_execute_func(&(0x7f00000003c0)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:35:57 executing program 1: keyctl$set_reqkey_keyring(0x2, 0x0) add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x0, 0xfffffffffffffffa) keyctl$setperm(0xa, 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") getegid() syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000200)=0xc) getuid() getpgrp(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000300)='pkcs7_test\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000000180)=@proc, 0xc, &(0x7f0000002000)}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) getpid() shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000780)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f0000000800)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) getresuid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="212aad919424"}, 0x14) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b80)) 03:35:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x203) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x4030ae7b, &(0x7f0000000180)) 03:35:57 executing program 5: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpusettrustedkeyring!\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:35:58 executing program 2: keyctl$set_reqkey_keyring(0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x203) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x4030ae7b, &(0x7f0000000180)) 03:35:58 executing program 0: pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:35:58 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000480)='/dev/snd/controlC#\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000500), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) getpgrp(0xffffffffffffffff) getpid() getpgrp(0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000640), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000380)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getresgid(&(0x7f0000000d40), &(0x7f0000000540), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) fstat(0xffffffffffffffff, &(0x7f00000015c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in6}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001740)=0xe8) lstat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000780)) geteuid() 03:35:58 executing program 1: keyctl$set_reqkey_keyring(0x2, 0x0) add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x0, 0xfffffffffffffffa) keyctl$setperm(0xa, 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") getegid() syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@broadcast, @broadcast}, &(0x7f0000000200)=0xc) getuid() getpgrp(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000300)='pkcs7_test\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000000180)=@proc, 0xc, &(0x7f0000002000)}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) getpid() shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000780)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f0000000800)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) getresuid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="212aad919424"}, 0x14) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b80)) 03:35:58 executing program 5: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpusettrustedkeyring!\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:35:58 executing program 2: keyctl$set_reqkey_keyring(0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x203) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x4030ae7b, &(0x7f0000000180)) 03:35:59 executing program 0: pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:35:59 executing program 4: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:59 executing program 1: shmctl$SHM_UNLOCK(0x0, 0x3) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:59 executing program 5: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpusettrustedkeyring!\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:35:59 executing program 2: keyctl$set_reqkey_keyring(0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x203) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x4030ae7b, &(0x7f0000000180)) 03:36:00 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @local}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, &(0x7f00000002c0)) geteuid() openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000c80)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000680)='/dev/null\x00', 0x0, 0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000006c0)) pkey_alloc(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) request_key(&(0x7f00000007c0)='ceph\x00', &(0x7f0000000800), &(0x7f0000000940)='md5sum*\x00', 0xfffffffffffffffd) keyctl$assume_authority(0x10, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) creat(&(0x7f0000000540)='./file0\x00', 0x0) geteuid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000280)) getpgid(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.stat\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000b40)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000780)=0x1c, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/225) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000580)={'yam0\x00', {0x2, 0x0, @multicast2}}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000002c0)) 03:36:00 executing program 4: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:36:00 executing program 1: shmctl$SHM_UNLOCK(0x0, 0x3) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:36:00 executing program 5: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpusettrustedkeyring!\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:36:00 executing program 2: signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/235) lremovexattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000003f40)=ANY=[]) syz_open_dev$mouse(&(0x7f0000000580)='/dev/input/mouse#\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f00000005c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) lookup_dcookie(0x0, &(0x7f0000000500)=""/202, 0xca) seccomp(0x0, 0x0, &(0x7f0000000100)) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)) socket$inet(0x2, 0x0, 0x9d0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000300), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000700)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote}}}, 0x90) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000800)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d6510e", "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"}}, 0x110) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socket$inet(0x2, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000004c0)={0x0, @rand_addr, @multicast1}, &(0x7f0000000500)=0xc) timer_create(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, @thr={&(0x7f0000000700), &(0x7f00000007c0)}}, &(0x7f00000017c0)) timer_getoverrun(0x0) pipe(&(0x7f00000005c0)) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000003c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in6=@local}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000540), &(0x7f00000007c0)=0xbf) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000940), &(0x7f0000000980)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) 03:36:01 executing program 3: io_setup(0x80, &(0x7f0000000240)) signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:36:01 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @local}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, &(0x7f00000002c0)) geteuid() openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000c80)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000680)='/dev/null\x00', 0x0, 0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000006c0)) pkey_alloc(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) request_key(&(0x7f00000007c0)='ceph\x00', &(0x7f0000000800), &(0x7f0000000940)='md5sum*\x00', 0xfffffffffffffffd) keyctl$assume_authority(0x10, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) creat(&(0x7f0000000540)='./file0\x00', 0x0) geteuid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000280)) getpgid(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.stat\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000b40)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000780)=0x1c, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/225) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000580)={'yam0\x00', {0x2, 0x0, @multicast2}}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000002c0)) 03:36:01 executing program 4: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:36:01 executing program 1: shmctl$SHM_UNLOCK(0x0, 0x3) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:36:01 executing program 5: madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) clock_gettime(0x0, &(0x7f0000001680)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000001c0)='\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getpid() getresuid(&(0x7f0000000200), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) io_setup(0x0, &(0x7f0000000240)) io_submit(0x0, 0x0, &(0x7f0000000d80)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000fc0)={{{@in6=@loopback, @in=@local}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000180)=0xfffffffffffffed8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000001140)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:36:01 executing program 2: signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/235) lremovexattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000003f40)=ANY=[]) syz_open_dev$mouse(&(0x7f0000000580)='/dev/input/mouse#\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f00000005c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) lookup_dcookie(0x0, &(0x7f0000000500)=""/202, 0xca) seccomp(0x0, 0x0, &(0x7f0000000100)) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)) socket$inet(0x2, 0x0, 0x9d0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000300), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000700)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote}}}, 0x90) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000800)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d6510e", "49b2d1e6f946ee14f515cffd85ff30b27da3c2fb71639a9104b83ba6455efdfa35c03f6ba713c584ee1a4e203d19b1af211d83e9286fb6dad20884288652f4092cec76576a257590dd1ff544b79d36d55e78de7b207bbc24cf5379f5883e5ad97780b8555cef288ab9dcf052ce8e7a1d7072144403f29cdc8aed5d4c28ca56c4e166ba2bbd1d1e8cb5723351e6dffaa45bd615a299be6aac5c1c1b56d2d9b5bcb0883a5df865e9625afe1939e5a128526eb00c088c8d550d5969a1b1892ed12a871ebff755e26fb75b218afa1f07d7939cdbae66c021066917136868daf1144cc08f58222e83739ac7e7e0e4e42fd8d2cb4f62ea5626a2626bd0a7e6ee219c50"}}, 0x110) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socket$inet(0x2, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000004c0)={0x0, @rand_addr, @multicast1}, &(0x7f0000000500)=0xc) timer_create(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, @thr={&(0x7f0000000700), &(0x7f00000007c0)}}, &(0x7f00000017c0)) timer_getoverrun(0x0) pipe(&(0x7f00000005c0)) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000003c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in6=@local}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000540), &(0x7f00000007c0)=0xbf) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000940), &(0x7f0000000980)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) 03:36:01 executing program 3: io_setup(0x80, &(0x7f0000000240)) signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:36:02 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @local}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, &(0x7f00000002c0)) geteuid() openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000c80)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000680)='/dev/null\x00', 0x0, 0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000006c0)) pkey_alloc(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) request_key(&(0x7f00000007c0)='ceph\x00', &(0x7f0000000800), &(0x7f0000000940)='md5sum*\x00', 0xfffffffffffffffd) keyctl$assume_authority(0x10, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) creat(&(0x7f0000000540)='./file0\x00', 0x0) geteuid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000280)) getpgid(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.stat\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000b40)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000780)=0x1c, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/225) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000580)={'yam0\x00', {0x2, 0x0, @multicast2}}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000002c0)) 03:36:02 executing program 4: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:36:02 executing program 1: shmctl$SHM_UNLOCK(0x0, 0x3) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:36:02 executing program 2: signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/235) lremovexattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000003f40)=ANY=[]) syz_open_dev$mouse(&(0x7f0000000580)='/dev/input/mouse#\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f00000005c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) lookup_dcookie(0x0, &(0x7f0000000500)=""/202, 0xca) seccomp(0x0, 0x0, &(0x7f0000000100)) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)) socket$inet(0x2, 0x0, 0x9d0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000300), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000700)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote}}}, 0x90) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000800)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d6510e", "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"}}, 0x110) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socket$inet(0x2, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000004c0)={0x0, @rand_addr, @multicast1}, &(0x7f0000000500)=0xc) timer_create(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, @thr={&(0x7f0000000700), &(0x7f00000007c0)}}, &(0x7f00000017c0)) timer_getoverrun(0x0) pipe(&(0x7f00000005c0)) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000003c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in6=@local}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000540), &(0x7f00000007c0)=0xbf) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000940), &(0x7f0000000980)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) 03:36:02 executing program 3: io_setup(0x80, &(0x7f0000000240)) signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:36:02 executing program 5: madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) clock_gettime(0x0, &(0x7f0000001680)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000001c0)='\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getpid() getresuid(&(0x7f0000000200), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) io_setup(0x0, &(0x7f0000000240)) io_submit(0x0, 0x0, &(0x7f0000000d80)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000fc0)={{{@in6=@loopback, @in=@local}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000180)=0xfffffffffffffed8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000001140)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:36:03 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @local}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, &(0x7f00000002c0)) geteuid() openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000c80)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000680)='/dev/null\x00', 0x0, 0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000006c0)) pkey_alloc(0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) request_key(&(0x7f00000007c0)='ceph\x00', &(0x7f0000000800), &(0x7f0000000940)='md5sum*\x00', 0xfffffffffffffffd) keyctl$assume_authority(0x10, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) creat(&(0x7f0000000540)='./file0\x00', 0x0) geteuid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000280)) getpgid(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.stat\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000b40)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000780)=0x1c, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000440)=""/225) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000580)={'yam0\x00', {0x2, 0x0, @multicast2}}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000002c0)) 03:36:03 executing program 4: socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000540)) accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000003c0), &(0x7f0000000140)=0xfffffffffffffebb) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f00000001c0), &(0x7f0000000080)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000480)) gettid() geteuid() getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:36:03 executing program 1: munmap(&(0x7f0000ff6000/0xa000)=nil, 0xa000) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) clock_gettime(0x0, &(0x7f00000005c0)) getpid() ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000840)=""/105) futex(&(0x7f00000006c0), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000800), 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f00000004c0)="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") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000640)={{0x2, 0x0, @rand_addr}, {0x0, @link_local}, 0x0, {0x2, 0x0, @multicast2}, 'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000008c0)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0), 0xc, &(0x7f0000000340)={&(0x7f0000000140)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000007c0)='trusted.overlay.origin\x00', &(0x7f0000000780)='y\x00', 0x1, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000180), 0x4) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:36:03 executing program 2: signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/235) lremovexattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000003f40)=ANY=[]) syz_open_dev$mouse(&(0x7f0000000580)='/dev/input/mouse#\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f00000005c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) lookup_dcookie(0x0, &(0x7f0000000500)=""/202, 0xca) seccomp(0x0, 0x0, &(0x7f0000000100)) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)) socket$inet(0x2, 0x0, 0x9d0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000300), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000700)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote}}}, 0x90) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000800)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d6510e", "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"}}, 0x110) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socket$inet(0x2, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000004c0)={0x0, @rand_addr, @multicast1}, &(0x7f0000000500)=0xc) timer_create(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, @thr={&(0x7f0000000700), &(0x7f00000007c0)}}, &(0x7f00000017c0)) timer_getoverrun(0x0) pipe(&(0x7f00000005c0)) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000003c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in6=@local}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000540), &(0x7f00000007c0)=0xbf) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000940), &(0x7f0000000980)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) 03:36:03 executing program 3: io_setup(0x80, &(0x7f0000000240)) signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:36:03 executing program 5: madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) clock_gettime(0x0, &(0x7f0000001680)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000001c0)='\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getpid() getresuid(&(0x7f0000000200), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) io_setup(0x0, &(0x7f0000000240)) io_submit(0x0, 0x0, &(0x7f0000000d80)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000fc0)={{{@in6=@loopback, @in=@local}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000180)=0xfffffffffffffed8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000001140)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:36:03 executing program 0: keyctl$set_reqkey_keyring(0x16, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0x392) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000300), &(0x7f0000000980), 0x0, 0x0) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) add_key(&(0x7f0000000700)='encrypted\x00', &(0x7f0000000740), &(0x7f0000000780), 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "17e887d8dc93d1a4f3a283cc8160f16958dc95a6907841d2224b132cef79ac66102ae03897cbbf168f601e048e0e76eec2c5ac085d1df0e0a820308765d4b047d6db91d5a225361a8fcc35031fb110f05a0602e5871f831820e594980d2d7c35b14c116b2b05dac358fab83a24c13eca10656c8b6fe6f3fa0132fe4162934340ff0a8ad21353d84875ab5184a7345ca7a49b390ef97d51adb3752695e35d51849dded7558cda909a270b3cdbae29ec25bf21a27e1be578c519b06eb6123db16d21dae168ef17ca4ddf16de09ec21cd315705060925c0887baa80fa91f1f1b53b70a3fc02a7dc44f84d173c1417eb0df0c513500f7d73ffb6f991bcca5739c67b"}}}, 0x128) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000400), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000840)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:36:04 executing program 4: socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000540)) accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000003c0), &(0x7f0000000140)=0xfffffffffffffebb) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f00000001c0), &(0x7f0000000080)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000480)) gettid() geteuid() getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:36:04 executing program 1: munmap(&(0x7f0000ff6000/0xa000)=nil, 0xa000) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) clock_gettime(0x0, &(0x7f00000005c0)) getpid() ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000840)=""/105) futex(&(0x7f00000006c0), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000800), 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f00000004c0)="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") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000640)={{0x2, 0x0, @rand_addr}, {0x0, @link_local}, 0x0, {0x2, 0x0, @multicast2}, 'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000008c0)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0), 0xc, &(0x7f0000000340)={&(0x7f0000000140)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000007c0)='trusted.overlay.origin\x00', &(0x7f0000000780)='y\x00', 0x1, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000180), 0x4) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:36:04 executing program 2: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) syz_open_dev$vcsa(&(0x7f0000000600)='/dev/vcsa#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000680)) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") keyctl$set_reqkey_keyring(0x10, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000240)={0x0, @empty, @remote}, &(0x7f0000000280)=0xfffffffffffffe72) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000002c0)={@ipv4={[], [], @broadcast}}) clock_gettime(0x0, &(0x7f0000000140)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000800)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000440), &(0x7f0000000480)=0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000540), &(0x7f0000000580)=0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000640)='nbd\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000840)=""/147, 0x93}, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000940)='/dev/input/mice\x00', 0x0, 0x0) 03:36:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000140)={"62726964676530000000008000", &(0x7f0000000100)}) 03:36:04 executing program 0: keyctl$set_reqkey_keyring(0x16, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0x392) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000300), &(0x7f0000000980), 0x0, 0x0) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) add_key(&(0x7f0000000700)='encrypted\x00', &(0x7f0000000740), &(0x7f0000000780), 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "17e887d8dc93d1a4f3a283cc8160f16958dc95a6907841d2224b132cef79ac66102ae03897cbbf168f601e048e0e76eec2c5ac085d1df0e0a820308765d4b047d6db91d5a225361a8fcc35031fb110f05a0602e5871f831820e594980d2d7c35b14c116b2b05dac358fab83a24c13eca10656c8b6fe6f3fa0132fe4162934340ff0a8ad21353d84875ab5184a7345ca7a49b390ef97d51adb3752695e35d51849dded7558cda909a270b3cdbae29ec25bf21a27e1be578c519b06eb6123db16d21dae168ef17ca4ddf16de09ec21cd315705060925c0887baa80fa91f1f1b53b70a3fc02a7dc44f84d173c1417eb0df0c513500f7d73ffb6f991bcca5739c67b"}}}, 0x128) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000400), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000840)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:36:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000140)={"62726964676530000000008000", &(0x7f0000000100)}) 03:36:05 executing program 5: madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) clock_gettime(0x0, &(0x7f0000001680)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000001c0)='\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getpid() getresuid(&(0x7f0000000200), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) io_setup(0x0, &(0x7f0000000240)) io_submit(0x0, 0x0, &(0x7f0000000d80)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000fc0)={{{@in6=@loopback, @in=@local}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000180)=0xfffffffffffffed8) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000001140)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:36:05 executing program 4: socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000540)) accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000003c0), &(0x7f0000000140)=0xfffffffffffffebb) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f00000001c0), &(0x7f0000000080)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000480)) gettid() geteuid() getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:36:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000140)={"62726964676530000000008000", &(0x7f0000000100)}) 03:36:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000140)={"62726964676530000000008000", &(0x7f0000000100)}) 03:36:05 executing program 3: prctl$intptr(0x1f, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x158}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) getpgid(0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp6\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) 03:36:05 executing program 1: munmap(&(0x7f0000ff6000/0xa000)=nil, 0xa000) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) clock_gettime(0x0, &(0x7f00000005c0)) getpid() ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000840)=""/105) futex(&(0x7f00000006c0), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000800), 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f00000004c0)="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") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000640)={{0x2, 0x0, @rand_addr}, {0x0, @link_local}, 0x0, {0x2, 0x0, @multicast2}, 'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000008c0)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0), 0xc, &(0x7f0000000340)={&(0x7f0000000140)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000007c0)='trusted.overlay.origin\x00', &(0x7f0000000780)='y\x00', 0x1, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000180), 0x4) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:36:05 executing program 0: keyctl$set_reqkey_keyring(0x16, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0x392) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000300), &(0x7f0000000980), 0x0, 0x0) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) add_key(&(0x7f0000000700)='encrypted\x00', &(0x7f0000000740), &(0x7f0000000780), 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000400), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000840)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:36:05 executing program 2: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) syz_open_dev$vcsa(&(0x7f0000000600)='/dev/vcsa#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000680)) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") keyctl$set_reqkey_keyring(0x10, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000240)={0x0, @empty, @remote}, &(0x7f0000000280)=0xfffffffffffffe72) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000002c0)={@ipv4={[], [], @broadcast}}) clock_gettime(0x0, &(0x7f0000000140)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000800)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000440), &(0x7f0000000480)=0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000540), &(0x7f0000000580)=0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000640)='nbd\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000840)=""/147, 0x93}, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000940)='/dev/input/mice\x00', 0x0, 0x0) 03:36:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={&(0x7f0000000000)={0x10, 0x9effffff}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8, 0x2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:36:06 executing program 4: socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000540)) accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000003c0), &(0x7f0000000140)=0xfffffffffffffebb) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f00000001c0), &(0x7f0000000080)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000480)) gettid() geteuid() getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:36:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={&(0x7f0000000000)={0x10, 0x9effffff}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8, 0x2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:36:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={&(0x7f0000000000)={0x10, 0x9effffff}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8, 0x2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:36:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={&(0x7f0000000000)={0x10, 0x9effffff}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8, 0x2}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:36:06 executing program 3: prctl$intptr(0x1f, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x158}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) getpgid(0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp6\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) 03:36:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000040)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000540)=0xc) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) 03:36:06 executing program 0: keyctl$set_reqkey_keyring(0x16, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0x392) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000300), &(0x7f0000000980), 0x0, 0x0) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)}}, 0x20) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) add_key(&(0x7f0000000700)='encrypted\x00', &(0x7f0000000740), &(0x7f0000000780), 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000400), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000840)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:36:06 executing program 1: munmap(&(0x7f0000ff6000/0xa000)=nil, 0xa000) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/urandom\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) clock_gettime(0x0, &(0x7f00000005c0)) getpid() ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000840)=""/105) futex(&(0x7f00000006c0), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000800), 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f00000004c0)="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") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@remote, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000640)={{0x2, 0x0, @rand_addr}, {0x0, @link_local}, 0x0, {0x2, 0x0, @multicast2}, 'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000008c0)={'team0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0), 0xc, &(0x7f0000000340)={&(0x7f0000000140)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000007c0)='trusted.overlay.origin\x00', &(0x7f0000000780)='y\x00', 0x1, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000180), 0x4) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:36:06 executing program 2: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) syz_open_dev$vcsa(&(0x7f0000000600)='/dev/vcsa#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000680)) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") keyctl$set_reqkey_keyring(0x10, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000240)={0x0, @empty, @remote}, &(0x7f0000000280)=0xfffffffffffffe72) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000002c0)={@ipv4={[], [], @broadcast}}) clock_gettime(0x0, &(0x7f0000000140)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000800)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000440), &(0x7f0000000480)=0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000540), &(0x7f0000000580)=0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000640)='nbd\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000840)=""/147, 0x93}, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000940)='/dev/input/mice\x00', 0x0, 0x0) 03:36:07 executing program 4: lstat(&(0x7f00000002c0)='./file0/file1\x00', &(0x7f0000000640)) clock_gettime(0x0, &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_vif\x00') ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe8}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000800)=ANY=[]) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) openat$sequencer(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer\x00', 0x0, 0x0) utime(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:36:07 executing program 3: prctl$intptr(0x1f, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x158}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) getpgid(0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp6\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) 03:36:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000040)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000540)=0xc) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) 03:36:07 executing program 0: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000c80)=0xc) getuid() lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001240)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000001340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b00)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000001c00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003880)) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@dev, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000001dc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e00), &(0x7f0000001e40)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002340)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002380)={{{@in6=@remote, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000002480)=0xe8) lstat(&(0x7f00000024c0)='./file0\x00', &(0x7f0000002500)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002580)='./file0\x00', &(0x7f00000025c0)) stat(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002a80)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002b80)=0xe8) getresgid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d40), &(0x7f0000002d80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002dc0)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000002ec0)=0xe8) getresgid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getpid() fstat(0xffffffffffffffff, &(0x7f0000002fc0)) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003100)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003140)={{{@in=@dev, @in=@remote}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000003240)=0xe8) lstat(&(0x7f0000003280)='./file0\x00', &(0x7f00000032c0)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in6=@ipv4={[], [], @rand_addr}, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000003440)=0xe8) stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000036c0), 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000001680), &(0x7f0000000340)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:36:07 executing program 2: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) syz_open_dev$vcsa(&(0x7f0000000600)='/dev/vcsa#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000680)) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a06226440f51e104220010f0f021a05d2f8a200f14430ac3f34f990fcd2e300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1201460f01ee9f") keyctl$set_reqkey_keyring(0x10, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000240)={0x0, @empty, @remote}, &(0x7f0000000280)=0xfffffffffffffe72) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000002c0)={@ipv4={[], [], @broadcast}}) clock_gettime(0x0, &(0x7f0000000140)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000800)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000440), &(0x7f0000000480)=0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000540), &(0x7f0000000580)=0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000640)='nbd\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000840)=""/147, 0x93}, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000940)='/dev/input/mice\x00', 0x0, 0x0) 03:36:08 executing program 1: utime(&(0x7f00000004c0)='.\x00', &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) geteuid() fstat(0xffffffffffffffff, &(0x7f00000006c0)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:36:08 executing program 4: lstat(&(0x7f00000002c0)='./file0/file1\x00', &(0x7f0000000640)) clock_gettime(0x0, &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_vif\x00') ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe8}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000800)=ANY=[]) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) openat$sequencer(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer\x00', 0x0, 0x0) utime(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:36:08 executing program 3: prctl$intptr(0x1f, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x158}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) getpgid(0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp6\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) 03:36:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000040)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000540)=0xc) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) 03:36:08 executing program 0: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000c80)=0xc) getuid() lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001240)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000001340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b00)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000001c00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003880)) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@dev, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000001dc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e00), &(0x7f0000001e40)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002340)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002380)={{{@in6=@remote, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000002480)=0xe8) lstat(&(0x7f00000024c0)='./file0\x00', &(0x7f0000002500)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002580)='./file0\x00', &(0x7f00000025c0)) stat(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002a80)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002b80)=0xe8) getresgid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d40), &(0x7f0000002d80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002dc0)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000002ec0)=0xe8) getresgid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getpid() fstat(0xffffffffffffffff, &(0x7f0000002fc0)) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003100)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003140)={{{@in=@dev, @in=@remote}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000003240)=0xe8) lstat(&(0x7f0000003280)='./file0\x00', &(0x7f00000032c0)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in6=@ipv4={[], [], @rand_addr}, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000003440)=0xe8) stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000036c0), 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000001680), &(0x7f0000000340)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:36:08 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = gettid() poll(&(0x7f0000000480), 0x0, 0xd2) tgkill(r0, r0, 0x1a) 03:36:09 executing program 1: utime(&(0x7f00000004c0)='.\x00', &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) geteuid() fstat(0xffffffffffffffff, &(0x7f00000006c0)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:36:09 executing program 4: lstat(&(0x7f00000002c0)='./file0/file1\x00', &(0x7f0000000640)) clock_gettime(0x0, &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_vif\x00') ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe8}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000800)=ANY=[]) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) openat$sequencer(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer\x00', 0x0, 0x0) utime(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:36:09 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = gettid() poll(&(0x7f0000000480), 0x0, 0xd2) tgkill(r0, r0, 0x1a) 03:36:09 executing program 3: ustat(0x6, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000006c0)=ANY=[], &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000002540)) getgroups(0x0, &(0x7f00000025c0)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000080)) fstat(0xffffffffffffffff, &(0x7f0000002740)) socket$inet_tcp(0x2, 0x1, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in, &(0x7f00000000c0)=0x80, 0x0) getrusage(0x0, &(0x7f0000000440)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000005c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) 03:36:09 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = gettid() poll(&(0x7f0000000480), 0x0, 0xd2) tgkill(r0, r0, 0x1a) 03:36:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000040)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000540)=0xc) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) 03:36:09 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = gettid() poll(&(0x7f0000000480), 0x0, 0xd2) tgkill(r0, r0, 0x1a) 03:36:09 executing program 0: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000c80)=0xc) getuid() lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001240)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000001340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b00)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000001c00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003880)) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@dev, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000001dc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e00), &(0x7f0000001e40)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002340)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002380)={{{@in6=@remote, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000002480)=0xe8) lstat(&(0x7f00000024c0)='./file0\x00', &(0x7f0000002500)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002580)='./file0\x00', &(0x7f00000025c0)) stat(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002a80)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002b80)=0xe8) getresgid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d40), &(0x7f0000002d80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002dc0)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000002ec0)=0xe8) getresgid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getpid() fstat(0xffffffffffffffff, &(0x7f0000002fc0)) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003100)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003140)={{{@in=@dev, @in=@remote}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000003240)=0xe8) lstat(&(0x7f0000003280)='./file0\x00', &(0x7f00000032c0)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in6=@ipv4={[], [], @rand_addr}, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000003440)=0xe8) stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000036c0), 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000001680), &(0x7f0000000340)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:36:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000540)) keyctl$set_reqkey_keyring(0x10, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000000280)) memfd_create(&(0x7f0000000040)='%[eth1em1md5summd5sum\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000700), &(0x7f0000000740), 0x0, 0xfffffffffffffff8) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000380)=""/217) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000480)) keyctl$setperm(0x5, 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f00000002c0)=""/154) syz_execute_func(&(0x7f0000000140)="42805da0215151ef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefac403ad5c2e08660f3887302f2fe5e5e575455f0f2e1a1a010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000740)=ANY=[], 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@dev, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@local, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000680)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a80)={'veth0_to_team\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000004300), 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000043c0)={0x0, @dev, @local}, &(0x7f0000004400)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000004e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000004ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004f00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004f40)={@empty, @loopback}, &(0x7f0000004f80)=0xc) getsockname(0xffffffffffffffff, &(0x7f0000004fc0)=@hci, &(0x7f0000005040)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005240)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000006c0)={@dev, @multicast2}, &(0x7f00000052c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000056c0)={{{@in=@multicast1, @in6}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@multicast1}}, &(0x7f00000057c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005800)={{{@in, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000005900)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005a00)={'vlan0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006080)={@local, @remote}, &(0x7f00000060c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'rose0\x00'}) accept4(0xffffffffffffffff, &(0x7f000000a540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a5c0)=0x80, 0x0) accept(0xffffffffffffffff, &(0x7f000000a640)=@xdp, &(0x7f000000a6c0)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a700)={@broadcast, @loopback}, &(0x7f000000a740)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000aa40)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000aa80)={{{@in, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000ab80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000abc0)={0x0, @multicast1, @dev}, &(0x7f000000ac00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000ac40)={@ipv4={[], [], @local}}, &(0x7f000000ac80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ad00)={0x0, @broadcast, @dev}, &(0x7f000000ad40)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ad80)={0x0, @dev, @multicast1}, &(0x7f000000adc0)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000b900)={&(0x7f0000000580), 0xc, &(0x7f000000b8c0)={&(0x7f000000ae00)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f00000005c0)={0x0, &(0x7f0000000580)}) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, &(0x7f00000004c0)) 03:36:09 executing program 1: utime(&(0x7f00000004c0)='.\x00', &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) geteuid() fstat(0xffffffffffffffff, &(0x7f00000006c0)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:36:10 executing program 4: lstat(&(0x7f00000002c0)='./file0/file1\x00', &(0x7f0000000640)) clock_gettime(0x0, &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_vif\x00') ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe8}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000800)=ANY=[]) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) openat$sequencer(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer\x00', 0x0, 0x0) utime(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:36:10 executing program 3: ustat(0x6, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000006c0)=ANY=[], &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000002540)) getgroups(0x0, &(0x7f00000025c0)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000080)) fstat(0xffffffffffffffff, &(0x7f0000002740)) socket$inet_tcp(0x2, 0x1, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in, &(0x7f00000000c0)=0x80, 0x0) getrusage(0x0, &(0x7f0000000440)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000005c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) 03:36:10 executing program 5: prctl$seccomp(0x28, 0x705000, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:36:10 executing program 0: mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000cc0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000c80)=0xc) getuid() lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001240)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000001340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b00)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000001c00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003880)) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@dev, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000001dc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e00), &(0x7f0000001e40)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002340)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002380)={{{@in6=@remote, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000002480)=0xe8) lstat(&(0x7f00000024c0)='./file0\x00', &(0x7f0000002500)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002580)='./file0\x00', &(0x7f00000025c0)) stat(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002a80)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002b80)=0xe8) getresgid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d40), &(0x7f0000002d80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002dc0)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000002ec0)=0xe8) getresgid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getpid() fstat(0xffffffffffffffff, &(0x7f0000002fc0)) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003100)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003140)={{{@in=@dev, @in=@remote}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000003240)=0xe8) lstat(&(0x7f0000003280)='./file0\x00', &(0x7f00000032c0)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in6=@ipv4={[], [], @rand_addr}, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000003440)=0xe8) stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000036c0), 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) syslog(0x0, &(0x7f00000009c0)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000001680), &(0x7f0000000340)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) accept4(0xffffffffffffff9c, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:36:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000540)) keyctl$set_reqkey_keyring(0x10, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000000280)) memfd_create(&(0x7f0000000040)='%[eth1em1md5summd5sum\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000700), &(0x7f0000000740), 0x0, 0xfffffffffffffff8) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000380)=""/217) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000480)) keyctl$setperm(0x5, 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f00000002c0)=""/154) syz_execute_func(&(0x7f0000000140)="42805da0215151ef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefac403ad5c2e08660f3887302f2fe5e5e575455f0f2e1a1a010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000740)=ANY=[], 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@dev, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@local, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000680)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a80)={'veth0_to_team\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000004300), 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000043c0)={0x0, @dev, @local}, &(0x7f0000004400)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000004e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000004ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004f00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004f40)={@empty, @loopback}, &(0x7f0000004f80)=0xc) getsockname(0xffffffffffffffff, &(0x7f0000004fc0)=@hci, &(0x7f0000005040)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005240)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000006c0)={@dev, @multicast2}, &(0x7f00000052c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000056c0)={{{@in=@multicast1, @in6}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@multicast1}}, &(0x7f00000057c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005800)={{{@in, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000005900)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005a00)={'vlan0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006080)={@local, @remote}, &(0x7f00000060c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'rose0\x00'}) accept4(0xffffffffffffffff, &(0x7f000000a540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a5c0)=0x80, 0x0) accept(0xffffffffffffffff, &(0x7f000000a640)=@xdp, &(0x7f000000a6c0)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a700)={@broadcast, @loopback}, &(0x7f000000a740)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000aa40)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000aa80)={{{@in, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000ab80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000abc0)={0x0, @multicast1, @dev}, &(0x7f000000ac00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000ac40)={@ipv4={[], [], @local}}, &(0x7f000000ac80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ad00)={0x0, @broadcast, @dev}, &(0x7f000000ad40)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ad80)={0x0, @dev, @multicast1}, &(0x7f000000adc0)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000b900)={&(0x7f0000000580), 0xc, &(0x7f000000b8c0)={&(0x7f000000ae00)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f00000005c0)={0x0, &(0x7f0000000580)}) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, &(0x7f00000004c0)) 03:36:10 executing program 1: utime(&(0x7f00000004c0)='.\x00', &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) geteuid() fstat(0xffffffffffffffff, &(0x7f00000006c0)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:36:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0a0775b005e381e5b3b60ced5c54dbb70000f0df8217ad40a001008000a000e6", 0x20) 03:36:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0a0775b005e381e5b3b60ced5c54dbb70000f0df8217ad40a001008000a000e6", 0x20) 03:36:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0a0775b005e381e5b3b60ced5c54dbb70000f0df8217ad40a001008000a000e6", 0x20) 03:36:11 executing program 3: ustat(0x6, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000006c0)=ANY=[], &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000002540)) getgroups(0x0, &(0x7f00000025c0)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000080)) fstat(0xffffffffffffffff, &(0x7f0000002740)) socket$inet_tcp(0x2, 0x1, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in, &(0x7f00000000c0)=0x80, 0x0) getrusage(0x0, &(0x7f0000000440)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000005c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) 03:36:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0a0775b005e381e5b3b60ced5c54dbb70000f0df8217ad40a001008000a000e6", 0x20) 03:36:11 executing program 5: prctl$seccomp(0x28, 0x705000, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:36:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x1c}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 03:36:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x1c}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 03:36:11 executing program 4: keyctl$set_reqkey_keyring(0x2, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:36:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x1c}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 03:36:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000540)) keyctl$set_reqkey_keyring(0x10, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000000280)) memfd_create(&(0x7f0000000040)='%[eth1em1md5summd5sum\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000700), &(0x7f0000000740), 0x0, 0xfffffffffffffff8) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000380)=""/217) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000480)) keyctl$setperm(0x5, 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f00000002c0)=""/154) syz_execute_func(&(0x7f0000000140)="42805da0215151ef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefac403ad5c2e08660f3887302f2fe5e5e575455f0f2e1a1a010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000740)=ANY=[], 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@dev, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@local, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000680)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a80)={'veth0_to_team\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000004300), 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000043c0)={0x0, @dev, @local}, &(0x7f0000004400)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000004e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000004ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004f00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004f40)={@empty, @loopback}, &(0x7f0000004f80)=0xc) getsockname(0xffffffffffffffff, &(0x7f0000004fc0)=@hci, &(0x7f0000005040)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005240)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000006c0)={@dev, @multicast2}, &(0x7f00000052c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000056c0)={{{@in=@multicast1, @in6}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@multicast1}}, &(0x7f00000057c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005800)={{{@in, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000005900)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005a00)={'vlan0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006080)={@local, @remote}, &(0x7f00000060c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'rose0\x00'}) accept4(0xffffffffffffffff, &(0x7f000000a540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a5c0)=0x80, 0x0) accept(0xffffffffffffffff, &(0x7f000000a640)=@xdp, &(0x7f000000a6c0)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a700)={@broadcast, @loopback}, &(0x7f000000a740)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000aa40)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000aa80)={{{@in, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000ab80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000abc0)={0x0, @multicast1, @dev}, &(0x7f000000ac00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000ac40)={@ipv4={[], [], @local}}, &(0x7f000000ac80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ad00)={0x0, @broadcast, @dev}, &(0x7f000000ad40)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ad80)={0x0, @dev, @multicast1}, &(0x7f000000adc0)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000b900)={&(0x7f0000000580), 0xc, &(0x7f000000b8c0)={&(0x7f000000ae00)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f00000005c0)={0x0, &(0x7f0000000580)}) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, &(0x7f00000004c0)) 03:36:11 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback, 0x200000}, 0x1c) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000180)={0x3a, @multicast1, 0x4e24, 0x2, 'lblcr\x00', 0x1, 0x40, 0x52}, 0x2c) sendmmsg(r2, &(0x7f00000002c0), 0x4cc, 0x20007ffc) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000140)=0x6b7, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0x4000000000000017, 0x3, 0x8, 0x7fffffff, 0x2}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000280)) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f00000001c0)={@multicast1, @rand_addr=0x9, 0x1, 0x1, [@broadcast]}, 0x14) 03:36:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x1c}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 03:36:11 executing program 4: keyctl$set_reqkey_keyring(0x2, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:36:12 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000001800), &(0x7f0000001840)=0x4) 03:36:12 executing program 3: ustat(0x6, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000006c0)=ANY=[], &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000002540)) getgroups(0x0, &(0x7f00000025c0)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000080)) fstat(0xffffffffffffffff, &(0x7f0000002740)) socket$inet_tcp(0x2, 0x1, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in, &(0x7f00000000c0)=0x80, 0x0) getrusage(0x0, &(0x7f0000000440)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000005c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) 03:36:12 executing program 4: keyctl$set_reqkey_keyring(0x2, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:36:12 executing program 5: prctl$seccomp(0x28, 0x705000, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:36:12 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000001800), &(0x7f0000001840)=0x4) 03:36:12 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000001800), &(0x7f0000001840)=0x4) 03:36:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000540)) keyctl$set_reqkey_keyring(0x10, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000000280)) memfd_create(&(0x7f0000000040)='%[eth1em1md5summd5sum\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000700), &(0x7f0000000740), 0x0, 0xfffffffffffffff8) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000380)=""/217) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000480)) keyctl$setperm(0x5, 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f00000002c0)=""/154) syz_execute_func(&(0x7f0000000140)="42805da0215151ef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefac403ad5c2e08660f3887302f2fe5e5e575455f0f2e1a1a010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000740)=ANY=[], 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@dev, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@local, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000680)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a80)={'veth0_to_team\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000004300), 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000043c0)={0x0, @dev, @local}, &(0x7f0000004400)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000004e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000004ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004f00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004f40)={@empty, @loopback}, &(0x7f0000004f80)=0xc) getsockname(0xffffffffffffffff, &(0x7f0000004fc0)=@hci, &(0x7f0000005040)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000005200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005240)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000006c0)={@dev, @multicast2}, &(0x7f00000052c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000056c0)={{{@in=@multicast1, @in6}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@multicast1}}, &(0x7f00000057c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005800)={{{@in, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000005900)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005a00)={'vlan0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006080)={@local, @remote}, &(0x7f00000060c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'rose0\x00'}) accept4(0xffffffffffffffff, &(0x7f000000a540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a5c0)=0x80, 0x0) accept(0xffffffffffffffff, &(0x7f000000a640)=@xdp, &(0x7f000000a6c0)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a700)={@broadcast, @loopback}, &(0x7f000000a740)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000aa40)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000aa80)={{{@in, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000ab80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000abc0)={0x0, @multicast1, @dev}, &(0x7f000000ac00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000ac40)={@ipv4={[], [], @local}}, &(0x7f000000ac80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ad00)={0x0, @broadcast, @dev}, &(0x7f000000ad40)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000ad80)={0x0, @dev, @multicast1}, &(0x7f000000adc0)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000b900)={&(0x7f0000000580), 0xc, &(0x7f000000b8c0)={&(0x7f000000ae00)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f00000005c0)={0x0, &(0x7f0000000580)}) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, &(0x7f00000004c0)) 03:36:12 executing program 4: keyctl$set_reqkey_keyring(0x2, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:36:12 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000001800), &(0x7f0000001840)=0x4) [ 1914.079470] binder: BINDER_SET_CONTEXT_MGR already set [ 1914.127786] binder: 28169:28208 ioctl 40046207 0 returned -16 03:36:12 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback, 0x200000}, 0x1c) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000180)={0x3a, @multicast1, 0x4e24, 0x2, 'lblcr\x00', 0x1, 0x40, 0x52}, 0x2c) sendmmsg(r2, &(0x7f00000002c0), 0x4cc, 0x20007ffc) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000140)=0x6b7, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0x4000000000000017, 0x3, 0x8, 0x7fffffff, 0x2}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000280)) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f00000001c0)={@multicast1, @rand_addr=0x9, 0x1, 0x1, [@broadcast]}, 0x14) 03:36:12 executing program 4: shmget(0x2, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) eventfd(0x0) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:36:12 executing program 0: umount2(&(0x7f0000000200)='./file0\x00', 0x11) modify_ldt$read_default(0x2, &(0x7f00000004c0)=""/21, 0x408ada457a664a1d) io_setup(0x0, &(0x7f0000000180)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file1\x00'}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file1\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000380)}, &(0x7f0000000480)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@local, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) lstat(&(0x7f0000000800)='./file1\x00', &(0x7f0000000840)) geteuid() lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in=@dev, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@ipv4}}, &(0x7f0000000a80)=0xe8) geteuid() lstat(&(0x7f0000000ac0)='./file1\x00', &(0x7f0000000b00)) getresuid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) getgid() getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) lstat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgroups(0x0, &(0x7f0000000e40)) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) stat(&(0x7f0000000f40)='./file1\x00', &(0x7f0000000f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getgroups(0x0, &(0x7f0000001080)) stat(&(0x7f00000010c0)='./file1\x00', &(0x7f0000001100)) setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000001180), 0x24, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000005c0), &(0x7f0000000600)=0x4) eventfd(0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ffc000/0x2000)=nil) seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2000058fe4}]}) rt_sigreturn() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:36:13 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback, 0x200000}, 0x1c) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000180)={0x3a, @multicast1, 0x4e24, 0x2, 'lblcr\x00', 0x1, 0x40, 0x52}, 0x2c) sendmmsg(r2, &(0x7f00000002c0), 0x4cc, 0x20007ffc) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000140)=0x6b7, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0x4000000000000017, 0x3, 0x8, 0x7fffffff, 0x2}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000280)) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f00000001c0)={@multicast1, @rand_addr=0x9, 0x1, 0x1, [@broadcast]}, 0x14) 03:36:13 executing program 5: prctl$seccomp(0x28, 0x705000, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 1914.644173] binder: BINDER_SET_CONTEXT_MGR already set [ 1914.649511] binder: 28225:28227 ioctl 40046207 0 returned -16 03:36:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000001000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0xd7, &(0x7f0000000100)="3c2dbcd405e8e96a639a2fee86dd", &(0x7f0000000500)=""/215, 0x3ffe}, 0x28) 03:36:13 executing program 4: shmget(0x2, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) eventfd(0x0) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:36:13 executing program 0: umount2(&(0x7f0000000200)='./file0\x00', 0x11) modify_ldt$read_default(0x2, &(0x7f00000004c0)=""/21, 0x408ada457a664a1d) io_setup(0x0, &(0x7f0000000180)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file1\x00'}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file1\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000380)}, &(0x7f0000000480)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@local, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) lstat(&(0x7f0000000800)='./file1\x00', &(0x7f0000000840)) geteuid() lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in=@dev, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@ipv4}}, &(0x7f0000000a80)=0xe8) geteuid() lstat(&(0x7f0000000ac0)='./file1\x00', &(0x7f0000000b00)) getresuid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) getgid() getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) lstat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgroups(0x0, &(0x7f0000000e40)) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) stat(&(0x7f0000000f40)='./file1\x00', &(0x7f0000000f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getgroups(0x0, &(0x7f0000001080)) stat(&(0x7f00000010c0)='./file1\x00', &(0x7f0000001100)) setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000001180), 0x24, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000005c0), &(0x7f0000000600)=0x4) eventfd(0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ffc000/0x2000)=nil) seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2000058fe4}]}) rt_sigreturn() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:36:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000001000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0xd7, &(0x7f0000000100)="3c2dbcd405e8e96a639a2fee86dd", &(0x7f0000000500)=""/215, 0x3ffe}, 0x28) 03:36:14 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback, 0x200000}, 0x1c) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000180)={0x3a, @multicast1, 0x4e24, 0x2, 'lblcr\x00', 0x1, 0x40, 0x52}, 0x2c) sendmmsg(r2, &(0x7f00000002c0), 0x4cc, 0x20007ffc) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000140)=0x6b7, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0x4000000000000017, 0x3, 0x8, 0x7fffffff, 0x2}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000280)) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f00000001c0)={@multicast1, @rand_addr=0x9, 0x1, 0x1, [@broadcast]}, 0x14) 03:36:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000001000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0xd7, &(0x7f0000000100)="3c2dbcd405e8e96a639a2fee86dd", &(0x7f0000000500)=""/215, 0x3ffe}, 0x28) 03:36:14 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback, 0x200000}, 0x1c) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000180)={0x3a, @multicast1, 0x4e24, 0x2, 'lblcr\x00', 0x1, 0x40, 0x52}, 0x2c) sendmmsg(r2, &(0x7f00000002c0), 0x4cc, 0x20007ffc) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000140)=0x6b7, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0x4000000000000017, 0x3, 0x8, 0x7fffffff, 0x2}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000280)) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f00000001c0)={@multicast1, @rand_addr=0x9, 0x1, 0x1, [@broadcast]}, 0x14) 03:36:14 executing program 5: ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000080)) pipe(&(0x7f00000003c0)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getegid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), 0xc) semctl$IPC_RMID(0x0, 0x0, 0xb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0726969ef69dc00d99069203737c3397c2a0626a540a52ef34298c4215971e400e5e5c4a2a10f9344613232231569c8212e1a1a3ef0f6585501c4e1edd1f631a3b786e298edc4227992749f55") [ 1915.886305] binder: BINDER_SET_CONTEXT_MGR already set [ 1915.920437] binder: 28260:28264 ioctl 40046207 0 returned -16 03:36:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000001000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0xd7, &(0x7f0000000100)="3c2dbcd405e8e96a639a2fee86dd", &(0x7f0000000500)=""/215, 0x3ffe}, 0x28) 03:36:15 executing program 0: umount2(&(0x7f0000000200)='./file0\x00', 0x11) modify_ldt$read_default(0x2, &(0x7f00000004c0)=""/21, 0x408ada457a664a1d) io_setup(0x0, &(0x7f0000000180)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file1\x00'}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file1\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000380)}, &(0x7f0000000480)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@local, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) lstat(&(0x7f0000000800)='./file1\x00', &(0x7f0000000840)) geteuid() lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in=@dev, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@ipv4}}, &(0x7f0000000a80)=0xe8) geteuid() lstat(&(0x7f0000000ac0)='./file1\x00', &(0x7f0000000b00)) getresuid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) getgid() getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) lstat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgroups(0x0, &(0x7f0000000e40)) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) stat(&(0x7f0000000f40)='./file1\x00', &(0x7f0000000f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getgroups(0x0, &(0x7f0000001080)) stat(&(0x7f00000010c0)='./file1\x00', &(0x7f0000001100)) setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000001180), 0x24, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000005c0), &(0x7f0000000600)=0x4) eventfd(0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ffc000/0x2000)=nil) seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2000058fe4}]}) rt_sigreturn() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:36:15 executing program 4: shmget(0x2, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) eventfd(0x0) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:36:15 executing program 2: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000100)) fstat(0xffffffffffffffff, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f7899c4e2192cbfc0e694187beefafa2179660f38302f4175450f2e1a400fbcc1c44379dfb9d6adbe90df470ff985feefffff9f3f") 03:36:15 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback, 0x200000}, 0x1c) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000180)={0x3a, @multicast1, 0x4e24, 0x2, 'lblcr\x00', 0x1, 0x40, 0x52}, 0x2c) sendmmsg(r2, &(0x7f00000002c0), 0x4cc, 0x20007ffc) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000140)=0x6b7, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0x4000000000000017, 0x3, 0x8, 0x7fffffff, 0x2}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000280)) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f00000001c0)={@multicast1, @rand_addr=0x9, 0x1, 0x1, [@broadcast]}, 0x14) 03:36:15 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x4ea) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) fstat(0xffffffffffffffff, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC]) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$intptr(0x29, 0x2) r3 = dup(r1) getsockopt$packet_int(r3, 0x107, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$nfc_llcp(r3, &(0x7f0000001880)=[{&(0x7f00000005c0)={0x27, 0x0, 0x0, 0x1, 0x0, 0x1, "f86f410538fe9dafc7cc34b37512b4cd953e7daf4608d8369255d8972135b379e00b489abdbbc236993ccc4539866d2d16540ae9893ac3954fed008e0e7480", 0x24}, 0x60, &(0x7f0000000640)}], 0x1, 0x41) clone(0x0, &(0x7f0000000240), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000200)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) 03:36:15 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback, 0x200000}, 0x1c) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000180)={0x3a, @multicast1, 0x4e24, 0x2, 'lblcr\x00', 0x1, 0x40, 0x52}, 0x2c) sendmmsg(r2, &(0x7f00000002c0), 0x4cc, 0x20007ffc) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000140)=0x6b7, 0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0x4000000000000017, 0x3, 0x8, 0x7fffffff, 0x2}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000280)) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f00000001c0)={@multicast1, @rand_addr=0x9, 0x1, 0x1, [@broadcast]}, 0x14) 03:36:15 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080), &(0x7f00000000c0)=0xc) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x6, 0x32, 0xffffffffffffffff, 0x0) close(r0) 03:36:15 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080), &(0x7f00000000c0)=0xc) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x6, 0x32, 0xffffffffffffffff, 0x0) close(r0) 03:36:16 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080), &(0x7f00000000c0)=0xc) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x6, 0x32, 0xffffffffffffffff, 0x0) close(r0) 03:36:16 executing program 0: umount2(&(0x7f0000000200)='./file0\x00', 0x11) modify_ldt$read_default(0x2, &(0x7f00000004c0)=""/21, 0x408ada457a664a1d) io_setup(0x0, &(0x7f0000000180)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file1\x00'}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file1\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000380)}, &(0x7f0000000480)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@local, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) lstat(&(0x7f0000000800)='./file1\x00', &(0x7f0000000840)) geteuid() lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in=@dev, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@ipv4}}, &(0x7f0000000a80)=0xe8) geteuid() lstat(&(0x7f0000000ac0)='./file1\x00', &(0x7f0000000b00)) getresuid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) getgid() getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) lstat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgroups(0x0, &(0x7f0000000e40)) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) stat(&(0x7f0000000f40)='./file1\x00', &(0x7f0000000f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getgroups(0x0, &(0x7f0000001080)) stat(&(0x7f00000010c0)='./file1\x00', &(0x7f0000001100)) setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000001180), 0x24, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000005c0), &(0x7f0000000600)=0x4) eventfd(0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ffc000/0x2000)=nil) seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2000058fe4}]}) rt_sigreturn() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:36:16 executing program 4: shmget(0x2, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) eventfd(0x0) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:36:16 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080), &(0x7f00000000c0)=0xc) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x6, 0x32, 0xffffffffffffffff, 0x0) close(r0) 03:36:16 executing program 2: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000100)) fstat(0xffffffffffffffff, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f7899c4e2192cbfc0e694187beefafa2179660f38302f4175450f2e1a400fbcc1c44379dfb9d6adbe90df470ff985feefffff9f3f") 03:36:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x2004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000ec00000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_aout(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) recvmmsg(r0, &(0x7f0000005e40), 0x0, 0x0, 0x0) 03:36:16 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() getpid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') accept(0xffffffffffffffff, &(0x7f0000000480)=@can, &(0x7f0000000240)=0x80) seccomp(0x0, 0x0, &(0x7f0000000100)) get_mempolicy(&(0x7f0000000040), &(0x7f0000000200), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) fsetxattr(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], &(0x7f0000000280)='y\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000500)="428055a0470fef69dcd9f3c483710d69ff66f91c870f87ba1ac4c482fd25208fe9689b4700420f1b8215000000b6c8e510e5f5d7765d5d932ebc2ebc0d64ac1a4c5d9f7ffd") splice(0xffffffffffffffff, &(0x7f0000000380), 0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0xfffffffffffffeba) inotify_init1(0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000580)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000640)=""/4096) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:36:16 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x4ea) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) fstat(0xffffffffffffffff, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC]) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$intptr(0x29, 0x2) r3 = dup(r1) getsockopt$packet_int(r3, 0x107, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$nfc_llcp(r3, &(0x7f0000001880)=[{&(0x7f00000005c0)={0x27, 0x0, 0x0, 0x1, 0x0, 0x1, "f86f410538fe9dafc7cc34b37512b4cd953e7daf4608d8369255d8972135b379e00b489abdbbc236993ccc4539866d2d16540ae9893ac3954fed008e0e7480", 0x24}, 0x60, &(0x7f0000000640)}], 0x1, 0x41) clone(0x0, &(0x7f0000000240), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000200)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) 03:36:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x2004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000ec00000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_aout(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) recvmmsg(r0, &(0x7f0000005e40), 0x0, 0x0, 0x0) 03:36:17 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() getpid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') accept(0xffffffffffffffff, &(0x7f0000000480)=@can, &(0x7f0000000240)=0x80) seccomp(0x0, 0x0, &(0x7f0000000100)) get_mempolicy(&(0x7f0000000040), &(0x7f0000000200), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) fsetxattr(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], &(0x7f0000000280)='y\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000500)="428055a0470fef69dcd9f3c483710d69ff66f91c870f87ba1ac4c482fd25208fe9689b4700420f1b8215000000b6c8e510e5f5d7765d5d932ebc2ebc0d64ac1a4c5d9f7ffd") splice(0xffffffffffffffff, &(0x7f0000000380), 0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0xfffffffffffffeba) inotify_init1(0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000580)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000640)=""/4096) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:36:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x2004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000ec00000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_aout(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) recvmmsg(r0, &(0x7f0000005e40), 0x0, 0x0, 0x0) 03:36:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x2004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000ec00000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_aout(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) recvmmsg(r0, &(0x7f0000005e40), 0x0, 0x0, 0x0) 03:36:17 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x4ea) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) fstat(0xffffffffffffffff, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC]) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$intptr(0x29, 0x2) r3 = dup(r1) getsockopt$packet_int(r3, 0x107, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$nfc_llcp(r3, &(0x7f0000001880)=[{&(0x7f00000005c0)={0x27, 0x0, 0x0, 0x1, 0x0, 0x1, "f86f410538fe9dafc7cc34b37512b4cd953e7daf4608d8369255d8972135b379e00b489abdbbc236993ccc4539866d2d16540ae9893ac3954fed008e0e7480", 0x24}, 0x60, &(0x7f0000000640)}], 0x1, 0x41) clone(0x0, &(0x7f0000000240), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000200)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) 03:36:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x2004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000ec00000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_aout(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) recvmmsg(r0, &(0x7f0000005e40), 0x0, 0x0, 0x0) 03:36:17 executing program 2: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000100)) fstat(0xffffffffffffffff, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f7899c4e2192cbfc0e694187beefafa2179660f38302f4175450f2e1a400fbcc1c44379dfb9d6adbe90df470ff985feefffff9f3f") 03:36:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x2004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000ec00000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_aout(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) recvmmsg(r0, &(0x7f0000005e40), 0x0, 0x0, 0x0) 03:36:17 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() getpid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') accept(0xffffffffffffffff, &(0x7f0000000480)=@can, &(0x7f0000000240)=0x80) seccomp(0x0, 0x0, &(0x7f0000000100)) get_mempolicy(&(0x7f0000000040), &(0x7f0000000200), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) fsetxattr(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], &(0x7f0000000280)='y\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000500)="428055a0470fef69dcd9f3c483710d69ff66f91c870f87ba1ac4c482fd25208fe9689b4700420f1b8215000000b6c8e510e5f5d7765d5d932ebc2ebc0d64ac1a4c5d9f7ffd") splice(0xffffffffffffffff, &(0x7f0000000380), 0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0xfffffffffffffeba) inotify_init1(0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000580)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000640)=""/4096) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:36:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x2004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000ec00000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_aout(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) recvmmsg(r0, &(0x7f0000005e40), 0x0, 0x0, 0x0) 03:36:17 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x4ea) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) fstat(0xffffffffffffffff, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC]) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$intptr(0x29, 0x2) r3 = dup(r1) getsockopt$packet_int(r3, 0x107, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$nfc_llcp(r3, &(0x7f0000001880)=[{&(0x7f00000005c0)={0x27, 0x0, 0x0, 0x1, 0x0, 0x1, "f86f410538fe9dafc7cc34b37512b4cd953e7daf4608d8369255d8972135b379e00b489abdbbc236993ccc4539866d2d16540ae9893ac3954fed008e0e7480", 0x24}, 0x60, &(0x7f0000000640)}], 0x1, 0x41) clone(0x0, &(0x7f0000000240), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000200)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) 03:36:17 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x4ea) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) fstat(0xffffffffffffffff, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC]) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$intptr(0x29, 0x2) r3 = dup(r1) getsockopt$packet_int(r3, 0x107, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$nfc_llcp(r3, &(0x7f0000001880)=[{&(0x7f00000005c0)={0x27, 0x0, 0x0, 0x1, 0x0, 0x1, "f86f410538fe9dafc7cc34b37512b4cd953e7daf4608d8369255d8972135b379e00b489abdbbc236993ccc4539866d2d16540ae9893ac3954fed008e0e7480", 0x24}, 0x60, &(0x7f0000000640)}], 0x1, 0x41) clone(0x0, &(0x7f0000000240), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000200)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) 03:36:17 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x4ea) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) fstat(0xffffffffffffffff, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC]) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$intptr(0x29, 0x2) r3 = dup(r1) getsockopt$packet_int(r3, 0x107, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$nfc_llcp(r3, &(0x7f0000001880)=[{&(0x7f00000005c0)={0x27, 0x0, 0x0, 0x1, 0x0, 0x1, "f86f410538fe9dafc7cc34b37512b4cd953e7daf4608d8369255d8972135b379e00b489abdbbc236993ccc4539866d2d16540ae9893ac3954fed008e0e7480", 0x24}, 0x60, &(0x7f0000000640)}], 0x1, 0x41) clone(0x0, &(0x7f0000000240), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000200)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) 03:36:17 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() getpid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') accept(0xffffffffffffffff, &(0x7f0000000480)=@can, &(0x7f0000000240)=0x80) seccomp(0x0, 0x0, &(0x7f0000000100)) get_mempolicy(&(0x7f0000000040), &(0x7f0000000200), 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) fsetxattr(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], &(0x7f0000000280)='y\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000500)="428055a0470fef69dcd9f3c483710d69ff66f91c870f87ba1ac4c482fd25208fe9689b4700420f1b8215000000b6c8e510e5f5d7765d5d932ebc2ebc0d64ac1a4c5d9f7ffd") splice(0xffffffffffffffff, &(0x7f0000000380), 0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0xfffffffffffffeba) inotify_init1(0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000580)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000640)=""/4096) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:36:18 executing program 2: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000100)) fstat(0xffffffffffffffff, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f7899c4e2192cbfc0e694187beefafa2179660f38302f4175450f2e1a400fbcc1c44379dfb9d6adbe90df470ff985feefffff9f3f") 03:36:18 executing program 3: prctl$setmm(0x17, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:36:18 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x4ea) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) fstat(0xffffffffffffffff, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC]) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$intptr(0x29, 0x2) r3 = dup(r1) getsockopt$packet_int(r3, 0x107, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$nfc_llcp(r3, &(0x7f0000001880)=[{&(0x7f00000005c0)={0x27, 0x0, 0x0, 0x1, 0x0, 0x1, "f86f410538fe9dafc7cc34b37512b4cd953e7daf4608d8369255d8972135b379e00b489abdbbc236993ccc4539866d2d16540ae9893ac3954fed008e0e7480", 0x24}, 0x60, &(0x7f0000000640)}], 0x1, 0x41) clone(0x0, &(0x7f0000000240), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000200)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) 03:36:18 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x4ea) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) fstat(0xffffffffffffffff, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC]) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$intptr(0x29, 0x2) r3 = dup(r1) getsockopt$packet_int(r3, 0x107, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$nfc_llcp(r3, &(0x7f0000001880)=[{&(0x7f00000005c0)={0x27, 0x0, 0x0, 0x1, 0x0, 0x1, "f86f410538fe9dafc7cc34b37512b4cd953e7daf4608d8369255d8972135b379e00b489abdbbc236993ccc4539866d2d16540ae9893ac3954fed008e0e7480", 0x24}, 0x60, &(0x7f0000000640)}], 0x1, 0x41) clone(0x0, &(0x7f0000000240), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000200)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) 03:36:18 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x4ea) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) fstat(0xffffffffffffffff, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC]) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$intptr(0x29, 0x2) r3 = dup(r1) getsockopt$packet_int(r3, 0x107, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$nfc_llcp(r3, &(0x7f0000001880)=[{&(0x7f00000005c0)={0x27, 0x0, 0x0, 0x1, 0x0, 0x1, "f86f410538fe9dafc7cc34b37512b4cd953e7daf4608d8369255d8972135b379e00b489abdbbc236993ccc4539866d2d16540ae9893ac3954fed008e0e7480", 0x24}, 0x60, &(0x7f0000000640)}], 0x1, 0x41) clone(0x0, &(0x7f0000000240), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000200)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) 03:36:18 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x4ea) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) fstat(0xffffffffffffffff, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC]) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$intptr(0x29, 0x2) r3 = dup(r1) getsockopt$packet_int(r3, 0x107, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$nfc_llcp(r3, &(0x7f0000001880)=[{&(0x7f00000005c0)={0x27, 0x0, 0x0, 0x1, 0x0, 0x1, "f86f410538fe9dafc7cc34b37512b4cd953e7daf4608d8369255d8972135b379e00b489abdbbc236993ccc4539866d2d16540ae9893ac3954fed008e0e7480", 0x24}, 0x60, &(0x7f0000000640)}], 0x1, 0x41) clone(0x0, &(0x7f0000000240), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000200)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) 03:36:19 executing program 2: clock_gettime(0x0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:36:19 executing program 3: prctl$setmm(0x17, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:36:19 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x4ea) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) fstat(0xffffffffffffffff, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC]) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$intptr(0x29, 0x2) r3 = dup(r1) getsockopt$packet_int(r3, 0x107, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$nfc_llcp(r3, &(0x7f0000001880)=[{&(0x7f00000005c0)={0x27, 0x0, 0x0, 0x1, 0x0, 0x1, "f86f410538fe9dafc7cc34b37512b4cd953e7daf4608d8369255d8972135b379e00b489abdbbc236993ccc4539866d2d16540ae9893ac3954fed008e0e7480", 0x24}, 0x60, &(0x7f0000000640)}], 0x1, 0x41) clone(0x0, &(0x7f0000000240), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000200)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) 03:36:19 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x4ea) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) fstat(0xffffffffffffffff, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC]) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$intptr(0x29, 0x2) r3 = dup(r1) getsockopt$packet_int(r3, 0x107, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$nfc_llcp(r3, &(0x7f0000001880)=[{&(0x7f00000005c0)={0x27, 0x0, 0x0, 0x1, 0x0, 0x1, "f86f410538fe9dafc7cc34b37512b4cd953e7daf4608d8369255d8972135b379e00b489abdbbc236993ccc4539866d2d16540ae9893ac3954fed008e0e7480", 0x24}, 0x60, &(0x7f0000000640)}], 0x1, 0x41) clone(0x0, &(0x7f0000000240), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000200)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) 03:36:19 executing program 5: rt_sigprocmask(0x0, &(0x7f0000a9a000)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) r0 = memfd_create(&(0x7f0000000000)="2c9908871cde871334bd41ea5c8c6500", 0x4) fallocate(r0, 0x0, 0x0, 0x3) 03:36:19 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x4ea) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) fstat(0xffffffffffffffff, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC]) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) prctl$intptr(0x29, 0x2) r3 = dup(r1) getsockopt$packet_int(r3, 0x107, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$nfc_llcp(r3, &(0x7f0000001880)=[{&(0x7f00000005c0)={0x27, 0x0, 0x0, 0x1, 0x0, 0x1, "f86f410538fe9dafc7cc34b37512b4cd953e7daf4608d8369255d8972135b379e00b489abdbbc236993ccc4539866d2d16540ae9893ac3954fed008e0e7480", 0x24}, 0x60, &(0x7f0000000640)}], 0x1, 0x41) clone(0x0, &(0x7f0000000240), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000200)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000180)={0x50, 0x0, 0x4}, 0x50) 03:36:19 executing program 5: rt_sigprocmask(0x0, &(0x7f0000a9a000)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) r0 = memfd_create(&(0x7f0000000000)="2c9908871cde871334bd41ea5c8c6500", 0x4) fallocate(r0, 0x0, 0x0, 0x3) 03:36:20 executing program 5: rt_sigprocmask(0x0, &(0x7f0000a9a000)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) r0 = memfd_create(&(0x7f0000000000)="2c9908871cde871334bd41ea5c8c6500", 0x4) fallocate(r0, 0x0, 0x0, 0x3) 03:36:20 executing program 2: clock_gettime(0x0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:36:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl(r1, 0x0, &(0x7f0000000000)) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{}]}) 03:36:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl(r1, 0x0, &(0x7f0000000000)) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{}]}) 03:36:20 executing program 3: prctl$setmm(0x17, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:36:20 executing program 5: rt_sigprocmask(0x0, &(0x7f0000a9a000)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) r0 = memfd_create(&(0x7f0000000000)="2c9908871cde871334bd41ea5c8c6500", 0x4) fallocate(r0, 0x0, 0x0, 0x3) 03:36:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl(r1, 0x0, &(0x7f0000000000)) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{}]}) 03:36:20 executing program 4: poll(&(0x7f0000000140), 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) fstat(0xffffffffffffffff, &(0x7f00000001c0)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) setgroups(0x0, &(0x7f0000000300)) sched_rr_get_interval(0x0, &(0x7f0000000080)) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:36:20 executing program 1: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ec0)={{{@in, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002fc0)=0xe8) getegid() accept(0xffffffffffffffff, &(0x7f0000003000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003080)=0x80) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000030c0)={{{@in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000031c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000033c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003400)) getpgid(0x0) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003980), &(0x7f00000039c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a80)) getuid() getresgid(&(0x7f0000003ac0), &(0x7f0000003b00), &(0x7f0000003b40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003b80)={{{@in6=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000003c80)=0xe8) getgroups(0x0, &(0x7f0000003cc0)) getpgrp(0xffffffffffffffff) stat(&(0x7f0000003d00)='./file0\x00', &(0x7f0000003d40)) getgroups(0x0, &(0x7f0000004840)) getpgid(0xffffffffffffffff) stat(&(0x7f0000003e00)='./file1\x00', &(0x7f0000003e40)) getgroups(0x0, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f40), &(0x7f0000003f80)=0xc) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003fc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004000)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000004100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004140)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) lstat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000004600)) getpgid(0x0) getuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:36:20 executing program 5: keyctl$set_reqkey_keyring(0x5, 0xfffffffd) socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000240)) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000180)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000340)={{0x77359400}, {0x77359400}}, &(0x7f0000000380)) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'vcan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000cc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d00)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000e00)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000e40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ec0)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f00)={{{@in=@loopback, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000001000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001040)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001080)={{{@in6=@loopback, @in6}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000001180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000011c0)={{{@in6=@remote, @in6=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f00000012c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001300)={{{@in6=@ipv4={[], [], @remote}, @in6=@ipv4}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001400)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001500)={'team0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001540)=@xdp, &(0x7f00000015c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001600)={{{@in=@rand_addr, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000001700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001880)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000018c0)={{{@in=@local, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000019c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000002100)={&(0x7f0000000440), 0xc, &(0x7f00000020c0)={&(0x7f0000001a00)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) 03:36:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl(r1, 0x0, &(0x7f0000000000)) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{}]}) 03:36:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000040)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 03:36:21 executing program 2: clock_gettime(0x0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:36:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000040)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 03:36:21 executing program 3: prctl$setmm(0x17, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:36:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000040)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 03:36:21 executing program 4: poll(&(0x7f0000000140), 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) fstat(0xffffffffffffffff, &(0x7f00000001c0)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) setgroups(0x0, &(0x7f0000000300)) sched_rr_get_interval(0x0, &(0x7f0000000080)) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:36:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0xc1105518, &(0x7f0000001000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) r4 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x401) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000680)={0x18, 0x0, 0x2, {0x1}}, 0x18) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000740)={0x400, 0x1, 0xc92, 0x800, &(0x7f00000006c0)=[{}]}) fgetxattr(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="5f72757366f7d9d7af7b47b22120f8100d71b37465642e0005e52a3337052a89fa78b0606dcca225a2af4fc089eeeb48c1f0cc325059f4614df6999f2892778244f434eca9c13d25bd20758f9d9926230717983f63eb0c6c84cd39a8b741fb9b493f5d83febc80a524969bdc36380607c54ed54ca82b5806c0f57634"], &(0x7f0000000340)=""/144, 0x90) sendmmsg$alg(r4, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="b5d7522f9d33b63f526ccc682338444a302afa4b8659b651f6dd80f6217b3ad368cce469ca517224d794e4a616f6bd1bdb5df82abf63f9903d677fcef84587ec411327d396ea1bab318b28cf7eb39a2b13487a44612f20177cdbd0c7f196d78cae9d448c5390b598d64d3ff995e2b4c7b3cbce997a527888", 0x78}], 0x1, &(0x7f0000001080)=[@iv={0x20, 0x117, 0x2, 0xc, "c5ab0f165fab8c3ed6cf8e37"}, @op={0x18, 0x117, 0x3, 0x1}], 0x38}], 0x1, 0x4010) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)=@random={'os2.', '#posix_acl_access\x00'}, &(0x7f00000004c0)=""/116, 0x74) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0)={0x0, 0x0, 0x72feb984, 0x0, 0x0}, &(0x7f0000000900)=0x10) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000000)={r7, 0x10001, 0x2, [0x5000, 0x7ff]}, &(0x7f00000000c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) dup2(r0, r6) 03:36:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, 0x1}, 0x50) umount2(&(0x7f0000000040)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 03:36:21 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@loopback}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getuid() fstat(0xffffffffffffffff, &(0x7f00000003c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@multicast1, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) geteuid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000ac0)=ANY=[], 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x59fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000880)="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") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000980)='system.posix_acl_access\x00', &(0x7f00000009c0), 0x24, 0x0) poll(&(0x7f0000000900), 0x0, 0x0) getuid() syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0f1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:36:22 executing program 1: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ec0)={{{@in, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002fc0)=0xe8) getegid() accept(0xffffffffffffffff, &(0x7f0000003000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003080)=0x80) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000030c0)={{{@in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000031c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000033c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003400)) getpgid(0x0) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003980), &(0x7f00000039c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a80)) getuid() getresgid(&(0x7f0000003ac0), &(0x7f0000003b00), &(0x7f0000003b40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003b80)={{{@in6=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000003c80)=0xe8) getgroups(0x0, &(0x7f0000003cc0)) getpgrp(0xffffffffffffffff) stat(&(0x7f0000003d00)='./file0\x00', &(0x7f0000003d40)) getgroups(0x0, &(0x7f0000004840)) getpgid(0xffffffffffffffff) stat(&(0x7f0000003e00)='./file1\x00', &(0x7f0000003e40)) getgroups(0x0, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f40), &(0x7f0000003f80)=0xc) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003fc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004000)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000004100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004140)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) lstat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000004600)) getpgid(0x0) getuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:36:22 executing program 2: clock_gettime(0x0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:36:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0xc1105518, &(0x7f0000001000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) r4 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x401) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000680)={0x18, 0x0, 0x2, {0x1}}, 0x18) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000740)={0x400, 0x1, 0xc92, 0x800, &(0x7f00000006c0)=[{}]}) fgetxattr(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="5f72757366f7d9d7af7b47b22120f8100d71b37465642e0005e52a3337052a89fa78b0606dcca225a2af4fc089eeeb48c1f0cc325059f4614df6999f2892778244f434eca9c13d25bd20758f9d9926230717983f63eb0c6c84cd39a8b741fb9b493f5d83febc80a524969bdc36380607c54ed54ca82b5806c0f57634"], &(0x7f0000000340)=""/144, 0x90) sendmmsg$alg(r4, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="b5d7522f9d33b63f526ccc682338444a302afa4b8659b651f6dd80f6217b3ad368cce469ca517224d794e4a616f6bd1bdb5df82abf63f9903d677fcef84587ec411327d396ea1bab318b28cf7eb39a2b13487a44612f20177cdbd0c7f196d78cae9d448c5390b598d64d3ff995e2b4c7b3cbce997a527888", 0x78}], 0x1, &(0x7f0000001080)=[@iv={0x20, 0x117, 0x2, 0xc, "c5ab0f165fab8c3ed6cf8e37"}, @op={0x18, 0x117, 0x3, 0x1}], 0x38}], 0x1, 0x4010) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)=@random={'os2.', '#posix_acl_access\x00'}, &(0x7f00000004c0)=""/116, 0x74) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0)={0x0, 0x0, 0x72feb984, 0x0, 0x0}, &(0x7f0000000900)=0x10) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000000)={r7, 0x10001, 0x2, [0x5000, 0x7ff]}, &(0x7f00000000c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) dup2(r0, r6) 03:36:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0xc1105518, &(0x7f0000001000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) r4 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x401) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000680)={0x18, 0x0, 0x2, {0x1}}, 0x18) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000740)={0x400, 0x1, 0xc92, 0x800, &(0x7f00000006c0)=[{}]}) fgetxattr(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="5f72757366f7d9d7af7b47b22120f8100d71b37465642e0005e52a3337052a89fa78b0606dcca225a2af4fc089eeeb48c1f0cc325059f4614df6999f2892778244f434eca9c13d25bd20758f9d9926230717983f63eb0c6c84cd39a8b741fb9b493f5d83febc80a524969bdc36380607c54ed54ca82b5806c0f57634"], &(0x7f0000000340)=""/144, 0x90) sendmmsg$alg(r4, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="b5d7522f9d33b63f526ccc682338444a302afa4b8659b651f6dd80f6217b3ad368cce469ca517224d794e4a616f6bd1bdb5df82abf63f9903d677fcef84587ec411327d396ea1bab318b28cf7eb39a2b13487a44612f20177cdbd0c7f196d78cae9d448c5390b598d64d3ff995e2b4c7b3cbce997a527888", 0x78}], 0x1, &(0x7f0000001080)=[@iv={0x20, 0x117, 0x2, 0xc, "c5ab0f165fab8c3ed6cf8e37"}, @op={0x18, 0x117, 0x3, 0x1}], 0x38}], 0x1, 0x4010) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)=@random={'os2.', '#posix_acl_access\x00'}, &(0x7f00000004c0)=""/116, 0x74) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0)={0x0, 0x0, 0x72feb984, 0x0, 0x0}, &(0x7f0000000900)=0x10) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000000)={r7, 0x10001, 0x2, [0x5000, 0x7ff]}, &(0x7f00000000c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) dup2(r0, r6) 03:36:22 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@loopback}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getuid() fstat(0xffffffffffffffff, &(0x7f00000003c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@multicast1, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) geteuid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000ac0)=ANY=[], 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x59fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000880)="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") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000980)='system.posix_acl_access\x00', &(0x7f00000009c0), 0x24, 0x0) poll(&(0x7f0000000900), 0x0, 0x0) getuid() syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0f1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:36:22 executing program 4: poll(&(0x7f0000000140), 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) fstat(0xffffffffffffffff, &(0x7f00000001c0)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) setgroups(0x0, &(0x7f0000000300)) sched_rr_get_interval(0x0, &(0x7f0000000080)) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:36:22 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@loopback}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getuid() fstat(0xffffffffffffffff, &(0x7f00000003c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@multicast1, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) geteuid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000ac0)=ANY=[], 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x59fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000880)="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") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000980)='system.posix_acl_access\x00', &(0x7f00000009c0), 0x24, 0x0) poll(&(0x7f0000000900), 0x0, 0x0) getuid() syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0f1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:36:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0xc1105518, &(0x7f0000001000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) r4 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x401) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000680)={0x18, 0x0, 0x2, {0x1}}, 0x18) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000740)={0x400, 0x1, 0xc92, 0x800, &(0x7f00000006c0)=[{}]}) fgetxattr(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="5f72757366f7d9d7af7b47b22120f8100d71b37465642e0005e52a3337052a89fa78b0606dcca225a2af4fc089eeeb48c1f0cc325059f4614df6999f2892778244f434eca9c13d25bd20758f9d9926230717983f63eb0c6c84cd39a8b741fb9b493f5d83febc80a524969bdc36380607c54ed54ca82b5806c0f57634"], &(0x7f0000000340)=""/144, 0x90) sendmmsg$alg(r4, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="b5d7522f9d33b63f526ccc682338444a302afa4b8659b651f6dd80f6217b3ad368cce469ca517224d794e4a616f6bd1bdb5df82abf63f9903d677fcef84587ec411327d396ea1bab318b28cf7eb39a2b13487a44612f20177cdbd0c7f196d78cae9d448c5390b598d64d3ff995e2b4c7b3cbce997a527888", 0x78}], 0x1, &(0x7f0000001080)=[@iv={0x20, 0x117, 0x2, 0xc, "c5ab0f165fab8c3ed6cf8e37"}, @op={0x18, 0x117, 0x3, 0x1}], 0x38}], 0x1, 0x4010) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)=@random={'os2.', '#posix_acl_access\x00'}, &(0x7f00000004c0)=""/116, 0x74) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0)={0x0, 0x0, 0x72feb984, 0x0, 0x0}, &(0x7f0000000900)=0x10) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000000)={r7, 0x10001, 0x2, [0x5000, 0x7ff]}, &(0x7f00000000c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) dup2(r0, r6) 03:36:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0xc1105518, &(0x7f0000001000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) r4 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x401) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000680)={0x18, 0x0, 0x2, {0x1}}, 0x18) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000740)={0x400, 0x1, 0xc92, 0x800, &(0x7f00000006c0)=[{}]}) fgetxattr(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="5f72757366f7d9d7af7b47b22120f8100d71b37465642e0005e52a3337052a89fa78b0606dcca225a2af4fc089eeeb48c1f0cc325059f4614df6999f2892778244f434eca9c13d25bd20758f9d9926230717983f63eb0c6c84cd39a8b741fb9b493f5d83febc80a524969bdc36380607c54ed54ca82b5806c0f57634"], &(0x7f0000000340)=""/144, 0x90) sendmmsg$alg(r4, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="b5d7522f9d33b63f526ccc682338444a302afa4b8659b651f6dd80f6217b3ad368cce469ca517224d794e4a616f6bd1bdb5df82abf63f9903d677fcef84587ec411327d396ea1bab318b28cf7eb39a2b13487a44612f20177cdbd0c7f196d78cae9d448c5390b598d64d3ff995e2b4c7b3cbce997a527888", 0x78}], 0x1, &(0x7f0000001080)=[@iv={0x20, 0x117, 0x2, 0xc, "c5ab0f165fab8c3ed6cf8e37"}, @op={0x18, 0x117, 0x3, 0x1}], 0x38}], 0x1, 0x4010) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)=@random={'os2.', '#posix_acl_access\x00'}, &(0x7f00000004c0)=""/116, 0x74) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0)={0x0, 0x0, 0x72feb984, 0x0, 0x0}, &(0x7f0000000900)=0x10) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000000)={r7, 0x10001, 0x2, [0x5000, 0x7ff]}, &(0x7f00000000c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) dup2(r0, r6) 03:36:23 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@loopback}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getuid() fstat(0xffffffffffffffff, &(0x7f00000003c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@multicast1, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) geteuid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000ac0)=ANY=[], 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x59fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000880)="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") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000980)='system.posix_acl_access\x00', &(0x7f00000009c0), 0x24, 0x0) poll(&(0x7f0000000900), 0x0, 0x0) getuid() syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0f1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:36:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0xc1105518, &(0x7f0000001000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) r4 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x401) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000680)={0x18, 0x0, 0x2, {0x1}}, 0x18) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000740)={0x400, 0x1, 0xc92, 0x800, &(0x7f00000006c0)=[{}]}) fgetxattr(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="5f72757366f7d9d7af7b47b22120f8100d71b37465642e0005e52a3337052a89fa78b0606dcca225a2af4fc089eeeb48c1f0cc325059f4614df6999f2892778244f434eca9c13d25bd20758f9d9926230717983f63eb0c6c84cd39a8b741fb9b493f5d83febc80a524969bdc36380607c54ed54ca82b5806c0f57634"], &(0x7f0000000340)=""/144, 0x90) sendmmsg$alg(r4, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="b5d7522f9d33b63f526ccc682338444a302afa4b8659b651f6dd80f6217b3ad368cce469ca517224d794e4a616f6bd1bdb5df82abf63f9903d677fcef84587ec411327d396ea1bab318b28cf7eb39a2b13487a44612f20177cdbd0c7f196d78cae9d448c5390b598d64d3ff995e2b4c7b3cbce997a527888", 0x78}], 0x1, &(0x7f0000001080)=[@iv={0x20, 0x117, 0x2, 0xc, "c5ab0f165fab8c3ed6cf8e37"}, @op={0x18, 0x117, 0x3, 0x1}], 0x38}], 0x1, 0x4010) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)=@random={'os2.', '#posix_acl_access\x00'}, &(0x7f00000004c0)=""/116, 0x74) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0)={0x0, 0x0, 0x72feb984, 0x0, 0x0}, &(0x7f0000000900)=0x10) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000000)={r7, 0x10001, 0x2, [0x5000, 0x7ff]}, &(0x7f00000000c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) dup2(r0, r6) 03:36:23 executing program 4: poll(&(0x7f0000000140), 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) fstat(0xffffffffffffffff, &(0x7f00000001c0)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) setgroups(0x0, &(0x7f0000000300)) sched_rr_get_interval(0x0, &(0x7f0000000080)) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:36:23 executing program 1: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ec0)={{{@in, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002fc0)=0xe8) getegid() accept(0xffffffffffffffff, &(0x7f0000003000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003080)=0x80) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000030c0)={{{@in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000031c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000033c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003400)) getpgid(0x0) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003980), &(0x7f00000039c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a80)) getuid() getresgid(&(0x7f0000003ac0), &(0x7f0000003b00), &(0x7f0000003b40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003b80)={{{@in6=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000003c80)=0xe8) getgroups(0x0, &(0x7f0000003cc0)) getpgrp(0xffffffffffffffff) stat(&(0x7f0000003d00)='./file0\x00', &(0x7f0000003d40)) getgroups(0x0, &(0x7f0000004840)) getpgid(0xffffffffffffffff) stat(&(0x7f0000003e00)='./file1\x00', &(0x7f0000003e40)) getgroups(0x0, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f40), &(0x7f0000003f80)=0xc) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003fc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004000)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000004100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004140)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) lstat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000004600)) getpgid(0x0) getuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:36:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0xc1105518, &(0x7f0000001000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) r4 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x401) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000680)={0x18, 0x0, 0x2, {0x1}}, 0x18) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000740)={0x400, 0x1, 0xc92, 0x800, &(0x7f00000006c0)=[{}]}) fgetxattr(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="5f72757366f7d9d7af7b47b22120f8100d71b37465642e0005e52a3337052a89fa78b0606dcca225a2af4fc089eeeb48c1f0cc325059f4614df6999f2892778244f434eca9c13d25bd20758f9d9926230717983f63eb0c6c84cd39a8b741fb9b493f5d83febc80a524969bdc36380607c54ed54ca82b5806c0f57634"], &(0x7f0000000340)=""/144, 0x90) sendmmsg$alg(r4, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="b5d7522f9d33b63f526ccc682338444a302afa4b8659b651f6dd80f6217b3ad368cce469ca517224d794e4a616f6bd1bdb5df82abf63f9903d677fcef84587ec411327d396ea1bab318b28cf7eb39a2b13487a44612f20177cdbd0c7f196d78cae9d448c5390b598d64d3ff995e2b4c7b3cbce997a527888", 0x78}], 0x1, &(0x7f0000001080)=[@iv={0x20, 0x117, 0x2, 0xc, "c5ab0f165fab8c3ed6cf8e37"}, @op={0x18, 0x117, 0x3, 0x1}], 0x38}], 0x1, 0x4010) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)=@random={'os2.', '#posix_acl_access\x00'}, &(0x7f00000004c0)=""/116, 0x74) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0)={0x0, 0x0, 0x72feb984, 0x0, 0x0}, &(0x7f0000000900)=0x10) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000000)={r7, 0x10001, 0x2, [0x5000, 0x7ff]}, &(0x7f00000000c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) dup2(r0, r6) 03:36:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0xc1105518, &(0x7f0000001000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) r4 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x401) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000680)={0x18, 0x0, 0x2, {0x1}}, 0x18) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000740)={0x400, 0x1, 0xc92, 0x800, &(0x7f00000006c0)=[{}]}) fgetxattr(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="5f72757366f7d9d7af7b47b22120f8100d71b37465642e0005e52a3337052a89fa78b0606dcca225a2af4fc089eeeb48c1f0cc325059f4614df6999f2892778244f434eca9c13d25bd20758f9d9926230717983f63eb0c6c84cd39a8b741fb9b493f5d83febc80a524969bdc36380607c54ed54ca82b5806c0f57634"], &(0x7f0000000340)=""/144, 0x90) sendmmsg$alg(r4, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="b5d7522f9d33b63f526ccc682338444a302afa4b8659b651f6dd80f6217b3ad368cce469ca517224d794e4a616f6bd1bdb5df82abf63f9903d677fcef84587ec411327d396ea1bab318b28cf7eb39a2b13487a44612f20177cdbd0c7f196d78cae9d448c5390b598d64d3ff995e2b4c7b3cbce997a527888", 0x78}], 0x1, &(0x7f0000001080)=[@iv={0x20, 0x117, 0x2, 0xc, "c5ab0f165fab8c3ed6cf8e37"}, @op={0x18, 0x117, 0x3, 0x1}], 0x38}], 0x1, 0x4010) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)=@random={'os2.', '#posix_acl_access\x00'}, &(0x7f00000004c0)=""/116, 0x74) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0)={0x0, 0x0, 0x72feb984, 0x0, 0x0}, &(0x7f0000000900)=0x10) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000000)={r7, 0x10001, 0x2, [0x5000, 0x7ff]}, &(0x7f00000000c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) dup2(r0, r6) 03:36:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0xc1105518, &(0x7f0000001000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) r4 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x401) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000680)={0x18, 0x0, 0x2, {0x1}}, 0x18) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000740)={0x400, 0x1, 0xc92, 0x800, &(0x7f00000006c0)=[{}]}) fgetxattr(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="5f72757366f7d9d7af7b47b22120f8100d71b37465642e0005e52a3337052a89fa78b0606dcca225a2af4fc089eeeb48c1f0cc325059f4614df6999f2892778244f434eca9c13d25bd20758f9d9926230717983f63eb0c6c84cd39a8b741fb9b493f5d83febc80a524969bdc36380607c54ed54ca82b5806c0f57634"], &(0x7f0000000340)=""/144, 0x90) sendmmsg$alg(r4, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="b5d7522f9d33b63f526ccc682338444a302afa4b8659b651f6dd80f6217b3ad368cce469ca517224d794e4a616f6bd1bdb5df82abf63f9903d677fcef84587ec411327d396ea1bab318b28cf7eb39a2b13487a44612f20177cdbd0c7f196d78cae9d448c5390b598d64d3ff995e2b4c7b3cbce997a527888", 0x78}], 0x1, &(0x7f0000001080)=[@iv={0x20, 0x117, 0x2, 0xc, "c5ab0f165fab8c3ed6cf8e37"}, @op={0x18, 0x117, 0x3, 0x1}], 0x38}], 0x1, 0x4010) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)=@random={'os2.', '#posix_acl_access\x00'}, &(0x7f00000004c0)=""/116, 0x74) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0)={0x0, 0x0, 0x72feb984, 0x0, 0x0}, &(0x7f0000000900)=0x10) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000000)={r7, 0x10001, 0x2, [0x5000, 0x7ff]}, &(0x7f00000000c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) dup2(r0, r6) 03:36:23 executing program 3: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) setsockopt$inet_group_source_req(r3, 0x0, 0x2c, &(0x7f0000000600)={0x0, {{0x2, 0x4e24}}, {{0x2, 0x4e21, @multicast2}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r5 = openat$cgroup_procs(r4, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') r6 = dup2(r4, r5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000000580)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) socket$nl_crypto(0x10, 0x3, 0x15) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r1) syncfs(r6) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000840)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000740)='./file0/file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={r7, r8, r9}, 0xc) creat(&(0x7f0000000400)='./file1\x00', 0x8) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r6, &(0x7f0000000240)={0x4}) 03:36:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0xc1105518, &(0x7f0000001000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) r4 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x401) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000680)={0x18, 0x0, 0x2, {0x1}}, 0x18) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000740)={0x400, 0x1, 0xc92, 0x800, &(0x7f00000006c0)=[{}]}) fgetxattr(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="5f72757366f7d9d7af7b47b22120f8100d71b37465642e0005e52a3337052a89fa78b0606dcca225a2af4fc089eeeb48c1f0cc325059f4614df6999f2892778244f434eca9c13d25bd20758f9d9926230717983f63eb0c6c84cd39a8b741fb9b493f5d83febc80a524969bdc36380607c54ed54ca82b5806c0f57634"], &(0x7f0000000340)=""/144, 0x90) sendmmsg$alg(r4, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="b5d7522f9d33b63f526ccc682338444a302afa4b8659b651f6dd80f6217b3ad368cce469ca517224d794e4a616f6bd1bdb5df82abf63f9903d677fcef84587ec411327d396ea1bab318b28cf7eb39a2b13487a44612f20177cdbd0c7f196d78cae9d448c5390b598d64d3ff995e2b4c7b3cbce997a527888", 0x78}], 0x1, &(0x7f0000001080)=[@iv={0x20, 0x117, 0x2, 0xc, "c5ab0f165fab8c3ed6cf8e37"}, @op={0x18, 0x117, 0x3, 0x1}], 0x38}], 0x1, 0x4010) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)=@random={'os2.', '#posix_acl_access\x00'}, &(0x7f00000004c0)=""/116, 0x74) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0)={0x0, 0x0, 0x72feb984, 0x0, 0x0}, &(0x7f0000000900)=0x10) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000000)={r7, 0x10001, 0x2, [0x5000, 0x7ff]}, &(0x7f00000000c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) dup2(r0, r6) 03:36:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0xc1105518, &(0x7f0000001000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) r4 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x401) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000680)={0x18, 0x0, 0x2, {0x1}}, 0x18) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000740)={0x400, 0x1, 0xc92, 0x800, &(0x7f00000006c0)=[{}]}) fgetxattr(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="5f72757366f7d9d7af7b47b22120f8100d71b37465642e0005e52a3337052a89fa78b0606dcca225a2af4fc089eeeb48c1f0cc325059f4614df6999f2892778244f434eca9c13d25bd20758f9d9926230717983f63eb0c6c84cd39a8b741fb9b493f5d83febc80a524969bdc36380607c54ed54ca82b5806c0f57634"], &(0x7f0000000340)=""/144, 0x90) sendmmsg$alg(r4, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="b5d7522f9d33b63f526ccc682338444a302afa4b8659b651f6dd80f6217b3ad368cce469ca517224d794e4a616f6bd1bdb5df82abf63f9903d677fcef84587ec411327d396ea1bab318b28cf7eb39a2b13487a44612f20177cdbd0c7f196d78cae9d448c5390b598d64d3ff995e2b4c7b3cbce997a527888", 0x78}], 0x1, &(0x7f0000001080)=[@iv={0x20, 0x117, 0x2, 0xc, "c5ab0f165fab8c3ed6cf8e37"}, @op={0x18, 0x117, 0x3, 0x1}], 0x38}], 0x1, 0x4010) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)=@random={'os2.', '#posix_acl_access\x00'}, &(0x7f00000004c0)=""/116, 0x74) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0)={0x0, 0x0, 0x72feb984, 0x0, 0x0}, &(0x7f0000000900)=0x10) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000000)={r7, 0x10001, 0x2, [0x5000, 0x7ff]}, &(0x7f00000000c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) dup2(r0, r6) 03:36:24 executing program 5: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ustat(0x0, &(0x7f0000001200)) clock_gettime(0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_execute_func(&(0x7f00000001c0)="42805da0610fef69dc0fc201e5eeeeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe9f7f") setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000680)=@security={'security\x00', 0xe, 0x4, 0x3f0, 0x0, 0x108, 0x0, 0x108, 0x108, 0x378, 0x378, 0x378, 0x378, 0x378, 0x4, &(0x7f00000004c0), {[{{@ipv6={@remote, @mcast1, [], [], 'tunl0\x00', 'gretap0\x00'}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@ipv6={@mcast2, @dev, [], [], 'bcsf0\x00', 'team_slave_1\x00'}, 0x0, 0xc8, 0x110}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x450) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:36:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r3 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f00000000c0)=@srh={0x0, 0x6, 0x4, 0x3, 0x0, 0x0, 0x0, [@ipv4={[], [], @rand_addr}, @loopback, @dev]}, 0x38) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x7, 0x2, 0x1000, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0x0, 0xffffffff]}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8929, &(0x7f0000000080)={'gretap0\x00', @ifru_addrs=@nfc={0x27, 0x1, 0x1, 0x3}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000003c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r4, r0}}, 0x18) io_setup(0x0, &(0x7f00000000c0)) 03:36:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0xc1105518, &(0x7f0000001000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) r4 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x401) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000680)={0x18, 0x0, 0x2, {0x1}}, 0x18) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000740)={0x400, 0x1, 0xc92, 0x800, &(0x7f00000006c0)=[{}]}) fgetxattr(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="5f72757366f7d9d7af7b47b22120f8100d71b37465642e0005e52a3337052a89fa78b0606dcca225a2af4fc089eeeb48c1f0cc325059f4614df6999f2892778244f434eca9c13d25bd20758f9d9926230717983f63eb0c6c84cd39a8b741fb9b493f5d83febc80a524969bdc36380607c54ed54ca82b5806c0f57634"], &(0x7f0000000340)=""/144, 0x90) sendmmsg$alg(r4, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="b5d7522f9d33b63f526ccc682338444a302afa4b8659b651f6dd80f6217b3ad368cce469ca517224d794e4a616f6bd1bdb5df82abf63f9903d677fcef84587ec411327d396ea1bab318b28cf7eb39a2b13487a44612f20177cdbd0c7f196d78cae9d448c5390b598d64d3ff995e2b4c7b3cbce997a527888", 0x78}], 0x1, &(0x7f0000001080)=[@iv={0x20, 0x117, 0x2, 0xc, "c5ab0f165fab8c3ed6cf8e37"}, @op={0x18, 0x117, 0x3, 0x1}], 0x38}], 0x1, 0x4010) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)=@random={'os2.', '#posix_acl_access\x00'}, &(0x7f00000004c0)=""/116, 0x74) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0)={0x0, 0x0, 0x72feb984, 0x0, 0x0}, &(0x7f0000000900)=0x10) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000000)={r7, 0x10001, 0x2, [0x5000, 0x7ff]}, &(0x7f00000000c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) dup2(r0, r6) 03:36:25 executing program 5: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ustat(0x0, &(0x7f0000001200)) clock_gettime(0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_execute_func(&(0x7f00000001c0)="42805da0610fef69dc0fc201e5eeeeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe9f7f") setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000680)=@security={'security\x00', 0xe, 0x4, 0x3f0, 0x0, 0x108, 0x0, 0x108, 0x108, 0x378, 0x378, 0x378, 0x378, 0x378, 0x4, &(0x7f00000004c0), {[{{@ipv6={@remote, @mcast1, [], [], 'tunl0\x00', 'gretap0\x00'}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@ipv6={@mcast2, @dev, [], [], 'bcsf0\x00', 'team_slave_1\x00'}, 0x0, 0xc8, 0x110}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x450) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:36:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000400)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0xc1105518, &(0x7f0000001000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000300)={r2}) r4 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x401) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000680)={0x18, 0x0, 0x2, {0x1}}, 0x18) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000740)={0x400, 0x1, 0xc92, 0x800, &(0x7f00000006c0)=[{}]}) fgetxattr(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="5f72757366f7d9d7af7b47b22120f8100d71b37465642e0005e52a3337052a89fa78b0606dcca225a2af4fc089eeeb48c1f0cc325059f4614df6999f2892778244f434eca9c13d25bd20758f9d9926230717983f63eb0c6c84cd39a8b741fb9b493f5d83febc80a524969bdc36380607c54ed54ca82b5806c0f57634"], &(0x7f0000000340)=""/144, 0x90) sendmmsg$alg(r4, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000580)="b5d7522f9d33b63f526ccc682338444a302afa4b8659b651f6dd80f6217b3ad368cce469ca517224d794e4a616f6bd1bdb5df82abf63f9903d677fcef84587ec411327d396ea1bab318b28cf7eb39a2b13487a44612f20177cdbd0c7f196d78cae9d448c5390b598d64d3ff995e2b4c7b3cbce997a527888", 0x78}], 0x1, &(0x7f0000001080)=[@iv={0x20, 0x117, 0x2, 0xc, "c5ab0f165fab8c3ed6cf8e37"}, @op={0x18, 0x117, 0x3, 0x1}], 0x38}], 0x1, 0x4010) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)=@random={'os2.', '#posix_acl_access\x00'}, &(0x7f00000004c0)=""/116, 0x74) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000008c0)={0x0, 0x0, 0x72feb984, 0x0, 0x0}, &(0x7f0000000900)=0x10) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000000)={r7, 0x10001, 0x2, [0x5000, 0x7ff]}, &(0x7f00000000c0)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) dup2(r0, r6) 03:36:26 executing program 1: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ec0)={{{@in, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002fc0)=0xe8) getegid() accept(0xffffffffffffffff, &(0x7f0000003000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003080)=0x80) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000030c0)={{{@in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000031c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000033c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003400)) getpgid(0x0) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003980), &(0x7f00000039c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a80)) getuid() getresgid(&(0x7f0000003ac0), &(0x7f0000003b00), &(0x7f0000003b40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003b80)={{{@in6=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000003c80)=0xe8) getgroups(0x0, &(0x7f0000003cc0)) getpgrp(0xffffffffffffffff) stat(&(0x7f0000003d00)='./file0\x00', &(0x7f0000003d40)) getgroups(0x0, &(0x7f0000004840)) getpgid(0xffffffffffffffff) stat(&(0x7f0000003e00)='./file1\x00', &(0x7f0000003e40)) getgroups(0x0, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f40), &(0x7f0000003f80)=0xc) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003fc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004000)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000004100)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004140)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) lstat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000004600)) getpgid(0x0) getuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004700), 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:36:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r3 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f00000000c0)=@srh={0x0, 0x6, 0x4, 0x3, 0x0, 0x0, 0x0, [@ipv4={[], [], @rand_addr}, @loopback, @dev]}, 0x38) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x7, 0x2, 0x1000, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0x0, 0xffffffff]}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8929, &(0x7f0000000080)={'gretap0\x00', @ifru_addrs=@nfc={0x27, 0x1, 0x1, 0x3}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000003c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r4, r0}}, 0x18) io_setup(0x0, &(0x7f00000000c0)) 03:36:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r3 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f00000000c0)=@srh={0x0, 0x6, 0x4, 0x3, 0x0, 0x0, 0x0, [@ipv4={[], [], @rand_addr}, @loopback, @dev]}, 0x38) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x7, 0x2, 0x1000, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0x0, 0xffffffff]}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8929, &(0x7f0000000080)={'gretap0\x00', @ifru_addrs=@nfc={0x27, 0x1, 0x1, 0x3}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000003c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r4, r0}}, 0x18) io_setup(0x0, &(0x7f00000000c0)) 03:36:26 executing program 5: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ustat(0x0, &(0x7f0000001200)) clock_gettime(0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_execute_func(&(0x7f00000001c0)="42805da0610fef69dc0fc201e5eeeeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe9f7f") setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000680)=@security={'security\x00', 0xe, 0x4, 0x3f0, 0x0, 0x108, 0x0, 0x108, 0x108, 0x378, 0x378, 0x378, 0x378, 0x378, 0x4, &(0x7f00000004c0), {[{{@ipv6={@remote, @mcast1, [], [], 'tunl0\x00', 'gretap0\x00'}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@ipv6={@mcast2, @dev, [], [], 'bcsf0\x00', 'team_slave_1\x00'}, 0x0, 0xc8, 0x110}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x450) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:36:26 executing program 3: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) setsockopt$inet_group_source_req(r3, 0x0, 0x2c, &(0x7f0000000600)={0x0, {{0x2, 0x4e24}}, {{0x2, 0x4e21, @multicast2}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r5 = openat$cgroup_procs(r4, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') r6 = dup2(r4, r5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000000580)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) socket$nl_crypto(0x10, 0x3, 0x15) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r1) syncfs(r6) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000840)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000740)='./file0/file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={r7, r8, r9}, 0xc) creat(&(0x7f0000000400)='./file1\x00', 0x8) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r6, &(0x7f0000000240)={0x4}) 03:36:26 executing program 2: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setfsuid(r2) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)) 03:36:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r3 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f00000000c0)=@srh={0x0, 0x6, 0x4, 0x3, 0x0, 0x0, 0x0, [@ipv4={[], [], @rand_addr}, @loopback, @dev]}, 0x38) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x7, 0x2, 0x1000, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0x0, 0xffffffff]}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8929, &(0x7f0000000080)={'gretap0\x00', @ifru_addrs=@nfc={0x27, 0x1, 0x1, 0x3}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000003c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r4, r0}}, 0x18) io_setup(0x0, &(0x7f00000000c0)) 03:36:26 executing program 5: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ustat(0x0, &(0x7f0000001200)) clock_gettime(0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) syz_execute_func(&(0x7f00000001c0)="42805da0610fef69dc0fc201e5eeeeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe9f7f") setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000680)=@security={'security\x00', 0xe, 0x4, 0x3f0, 0x0, 0x108, 0x0, 0x108, 0x108, 0x378, 0x378, 0x378, 0x378, 0x378, 0x4, &(0x7f00000004c0), {[{{@ipv6={@remote, @mcast1, [], [], 'tunl0\x00', 'gretap0\x00'}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@ipv6={@mcast2, @dev, [], [], 'bcsf0\x00', 'team_slave_1\x00'}, 0x0, 0xc8, 0x110}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x450) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:36:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r3 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f00000000c0)=@srh={0x0, 0x6, 0x4, 0x3, 0x0, 0x0, 0x0, [@ipv4={[], [], @rand_addr}, @loopback, @dev]}, 0x38) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x7, 0x2, 0x1000, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0x0, 0xffffffff]}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8929, &(0x7f0000000080)={'gretap0\x00', @ifru_addrs=@nfc={0x27, 0x1, 0x1, 0x3}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000003c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r4, r0}}, 0x18) io_setup(0x0, &(0x7f00000000c0)) 03:36:27 executing program 2: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setfsuid(r2) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)) 03:36:27 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) setsockopt$inet_group_source_req(r3, 0x0, 0x2c, &(0x7f0000000600)={0x0, {{0x2, 0x4e24}}, {{0x2, 0x4e21, @multicast2}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r5 = openat$cgroup_procs(r4, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') r6 = dup2(r4, r5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000000580)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) socket$nl_crypto(0x10, 0x3, 0x15) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r1) syncfs(r6) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000840)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000740)='./file0/file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={r7, r8, r9}, 0xc) creat(&(0x7f0000000400)='./file1\x00', 0x8) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r6, &(0x7f0000000240)={0x4}) 03:36:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r3 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f00000000c0)=@srh={0x0, 0x6, 0x4, 0x3, 0x0, 0x0, 0x0, [@ipv4={[], [], @rand_addr}, @loopback, @dev]}, 0x38) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x7, 0x2, 0x1000, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0x0, 0xffffffff]}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8929, &(0x7f0000000080)={'gretap0\x00', @ifru_addrs=@nfc={0x27, 0x1, 0x1, 0x3}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000003c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r4, r0}}, 0x18) io_setup(0x0, &(0x7f00000000c0)) 03:36:27 executing program 2: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setfsuid(r2) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)) 03:36:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r3 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f00000000c0)=@srh={0x0, 0x6, 0x4, 0x3, 0x0, 0x0, 0x0, [@ipv4={[], [], @rand_addr}, @loopback, @dev]}, 0x38) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x7, 0x2, 0x1000, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0x0, 0xffffffff]}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8929, &(0x7f0000000080)={'gretap0\x00', @ifru_addrs=@nfc={0x27, 0x1, 0x1, 0x3}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000003c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r4, r0}}, 0x18) io_setup(0x0, &(0x7f00000000c0)) 03:36:27 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) setsockopt$inet_group_source_req(r3, 0x0, 0x2c, &(0x7f0000000600)={0x0, {{0x2, 0x4e24}}, {{0x2, 0x4e21, @multicast2}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r5 = openat$cgroup_procs(r4, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') r6 = dup2(r4, r5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000000580)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) socket$nl_crypto(0x10, 0x3, 0x15) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r1) syncfs(r6) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000840)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000740)='./file0/file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={r7, r8, r9}, 0xc) creat(&(0x7f0000000400)='./file1\x00', 0x8) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r6, &(0x7f0000000240)={0x4}) 03:36:28 executing program 2: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setfsuid(r2) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)) 03:36:28 executing program 3: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) setsockopt$inet_group_source_req(r3, 0x0, 0x2c, &(0x7f0000000600)={0x0, {{0x2, 0x4e24}}, {{0x2, 0x4e21, @multicast2}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r5 = openat$cgroup_procs(r4, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') r6 = dup2(r4, r5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000000580)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) socket$nl_crypto(0x10, 0x3, 0x15) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r1) syncfs(r6) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000840)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000740)='./file0/file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={r7, r8, r9}, 0xc) creat(&(0x7f0000000400)='./file1\x00', 0x8) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r6, &(0x7f0000000240)={0x4}) 03:36:28 executing program 5: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) setsockopt$inet_group_source_req(r3, 0x0, 0x2c, &(0x7f0000000600)={0x0, {{0x2, 0x4e24}}, {{0x2, 0x4e21, @multicast2}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r5 = openat$cgroup_procs(r4, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') r6 = dup2(r4, r5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000000580)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) socket$nl_crypto(0x10, 0x3, 0x15) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r1) syncfs(r6) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000840)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000740)='./file0/file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={r7, r8, r9}, 0xc) creat(&(0x7f0000000400)='./file1\x00', 0x8) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r6, &(0x7f0000000240)={0x4}) 03:36:28 executing program 4: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) setsockopt$inet_group_source_req(r3, 0x0, 0x2c, &(0x7f0000000600)={0x0, {{0x2, 0x4e24}}, {{0x2, 0x4e21, @multicast2}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r5 = openat$cgroup_procs(r4, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') r6 = dup2(r4, r5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000000580)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) socket$nl_crypto(0x10, 0x3, 0x15) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r1) syncfs(r6) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000840)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000740)='./file0/file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={r7, r8, r9}, 0xc) creat(&(0x7f0000000400)='./file1\x00', 0x8) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r6, &(0x7f0000000240)={0x4}) 03:36:29 executing program 2: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) setsockopt$inet_group_source_req(r3, 0x0, 0x2c, &(0x7f0000000600)={0x0, {{0x2, 0x4e24}}, {{0x2, 0x4e21, @multicast2}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r5 = openat$cgroup_procs(r4, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') r6 = dup2(r4, r5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000000580)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) socket$nl_crypto(0x10, 0x3, 0x15) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r1) syncfs(r6) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000840)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000740)='./file0/file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={r7, r8, r9}, 0xc) creat(&(0x7f0000000400)='./file1\x00', 0x8) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r6, &(0x7f0000000240)={0x4}) [ 1930.930919] attempt to access beyond end of device [ 1930.992012] attempt to access beyond end of device [ 1930.997155] loop1: rw=1, want=114, limit=112 [ 1931.045414] loop3: rw=1048577, want=18853, limit=112 [ 1931.169024] attempt to access beyond end of device [ 1931.175501] loop5: rw=1, want=114, limit=112 [ 1931.199738] Buffer I/O error on dev loop1, logical block 113, lost async page write [ 1931.253416] Buffer I/O error on dev loop5, logical block 113, lost async page write [ 1931.340192] attempt to access beyond end of device [ 1931.716800] attempt to access beyond end of device [ 1931.721787] loop2: rw=1, want=130, limit=112 [ 1931.748803] attempt to access beyond end of device [ 1931.758628] attempt to access beyond end of device [ 1931.785380] attempt to access beyond end of device [ 1931.790373] loop4: rw=1, want=114, limit=112 [ 1932.612064] Buffer I/O error on dev loop4, logical block 113, lost async page write [ 1932.637980] attempt to access beyond end of device [ 1932.654433] loop4: rw=1, want=115, limit=112 [ 1932.669534] Buffer I/O error on dev loop4, logical block 114, lost async page write [ 1932.696616] attempt to access beyond end of device 03:36:31 executing program 3: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) setsockopt$inet_group_source_req(r3, 0x0, 0x2c, &(0x7f0000000600)={0x0, {{0x2, 0x4e24}}, {{0x2, 0x4e21, @multicast2}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r5 = openat$cgroup_procs(r4, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') r6 = dup2(r4, r5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000000580)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) socket$nl_crypto(0x10, 0x3, 0x15) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r1) syncfs(r6) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000840)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000740)='./file0/file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={r7, r8, r9}, 0xc) creat(&(0x7f0000000400)='./file1\x00', 0x8) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r6, &(0x7f0000000240)={0x4}) [ 1932.723963] loop1: rw=1, want=115, limit=112 [ 1932.745737] loop5: rw=1, want=115, limit=112 [ 1932.751540] Buffer I/O error on dev loop2, logical block 129, lost async page write [ 1932.764031] loop4: rw=1, want=116, limit=112 [ 1932.768692] Buffer I/O error on dev loop1, logical block 114, lost async page write [ 1932.880376] loop3: rw=1048577, want=22949, limit=112 [ 1932.902501] Buffer I/O error on dev loop5, logical block 114, lost async page write [ 1932.919844] Buffer I/O error on dev loop4, logical block 115, lost async page write [ 1932.971864] attempt to access beyond end of device [ 1932.982525] attempt to access beyond end of device [ 1932.987537] loop1: rw=1, want=116, limit=112 [ 1932.991968] Buffer I/O error on dev loop1, logical block 115, lost async page write [ 1933.015670] attempt to access beyond end of device 03:36:31 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) setsockopt$inet_group_source_req(r3, 0x0, 0x2c, &(0x7f0000000600)={0x0, {{0x2, 0x4e24}}, {{0x2, 0x4e21, @multicast2}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r5 = openat$cgroup_procs(r4, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') r6 = dup2(r4, r5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000000580)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) socket$nl_crypto(0x10, 0x3, 0x15) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r1) syncfs(r6) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000840)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000740)='./file0/file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={r7, r8, r9}, 0xc) creat(&(0x7f0000000400)='./file1\x00', 0x8) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r6, &(0x7f0000000240)={0x4}) 03:36:31 executing program 2: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) setsockopt$inet_group_source_req(r3, 0x0, 0x2c, &(0x7f0000000600)={0x0, {{0x2, 0x4e24}}, {{0x2, 0x4e21, @multicast2}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r5 = openat$cgroup_procs(r4, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') r6 = dup2(r4, r5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000000580)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) socket$nl_crypto(0x10, 0x3, 0x15) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r1) syncfs(r6) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000840)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000740)='./file0/file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={r7, r8, r9}, 0xc) creat(&(0x7f0000000400)='./file1\x00', 0x8) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r6, &(0x7f0000000240)={0x4}) [ 1933.020863] loop1: rw=1, want=117, limit=112 [ 1933.127115] attempt to access beyond end of device [ 1933.132234] loop2: rw=1, want=131, limit=112 [ 1933.139210] attempt to access beyond end of device [ 1933.181225] loop5: rw=1, want=116, limit=112 [ 1933.186781] Buffer I/O error on dev loop2, logical block 130, lost async page write [ 1933.204987] attempt to access beyond end of device [ 1933.216911] loop4: rw=1, want=117, limit=112 [ 1933.306254] attempt to access beyond end of device [ 1933.308649] attempt to access beyond end of device [ 1933.311249] loop5: rw=1, want=117, limit=112 [ 1933.320734] attempt to access beyond end of device [ 1933.321635] loop1: rw=1, want=130, limit=112 [ 1933.325778] loop5: rw=1, want=130, limit=112 [ 1933.325818] attempt to access beyond end of device [ 1933.331857] attempt to access beyond end of device [ 1933.334663] loop5: rw=1, want=131, limit=112 [ 1933.334712] attempt to access beyond end of device [ 1933.353997] loop5: rw=1, want=132, limit=112 [ 1933.358456] attempt to access beyond end of device [ 1933.363466] loop5: rw=1, want=133, limit=112 [ 1933.374816] attempt to access beyond end of device [ 1933.379796] loop5: rw=1, want=4237, limit=112 [ 1933.395285] attempt to access beyond end of device [ 1933.400267] loop5: rw=1, want=8333, limit=112 [ 1933.415739] attempt to access beyond end of device [ 1933.420720] loop5: rw=1, want=12429, limit=112 [ 1933.433184] attempt to access beyond end of device [ 1933.438156] loop5: rw=1, want=14549, limit=112 [ 1933.445200] attempt to access beyond end of device [ 1933.450153] loop5: rw=1, want=14550, limit=112 [ 1933.553757] attempt to access beyond end of device [ 1933.561200] attempt to access beyond end of device [ 1933.566377] loop4: rw=1, want=130, limit=112 [ 1933.575630] attempt to access beyond end of device [ 1933.587783] loop1: rw=1, want=131, limit=112 [ 1933.622462] loop3: rw=1, want=24165, limit=112 [ 1933.660669] attempt to access beyond end of device [ 1933.661746] loop5: rw=1, want=14551, limit=112 [ 1933.670908] attempt to access beyond end of device [ 1933.675993] loop2: rw=1, want=132, limit=112 [ 1933.680447] attempt to access beyond end of device [ 1933.746600] attempt to access beyond end of device [ 1933.751595] loop5: rw=1, want=14552, limit=112 [ 1933.760888] loop4: rw=1, want=131, limit=112 [ 1933.802933] attempt to access beyond end of device [ 1933.807931] loop4: rw=1, want=132, limit=112 [ 1933.812444] loop2: rw=1, want=133, limit=112 [ 1933.816956] attempt to access beyond end of device [ 1933.821898] loop2: rw=1, want=142, limit=112 [ 1933.883889] attempt to access beyond end of device [ 1933.888880] loop5: rw=1, want=14553, limit=112 [ 1933.914431] attempt to access beyond end of device 03:36:32 executing program 0: socket$netlink(0x10, 0x3, 0xa) socket$inet6(0xa, 0x0, 0x2) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xd, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r2 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r2, 0x8, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x1ff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r2, 0x7005) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getresuid(&(0x7f0000000280), &(0x7f0000000600), &(0x7f0000000640)) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000007c0)={0x0, {{0x2, 0x4e24, @rand_addr=0xff0000000}}}, 0x88) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8010, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000140)={r4}) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv6_getmulticast={0x14, 0x3a, 0xa0431baec83fd636, 0x70bd27, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x2404c8c4) eventfd2(0x0, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000340)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000000c0)={r6}) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x84) [ 1933.949500] attempt to access beyond end of device [ 1933.955228] loop2: rw=1, want=143, limit=112 [ 1933.965812] attempt to access beyond end of device [ 1933.977572] attempt to access beyond end of device [ 1933.987392] loop2: rw=1, want=144, limit=112 [ 1933.992763] loop1: rw=1, want=132, limit=112 [ 1933.995499] attempt to access beyond end of device [ 1934.008603] attempt to access beyond end of device [ 1934.045494] loop4: rw=1, want=133, limit=112 [ 1934.056104] loop2: rw=1, want=145, limit=112 [ 1934.062006] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1934.070271] FAT-fs (loop2): Filesystem has been set read-only 03:36:32 executing program 4: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) setsockopt$inet_group_source_req(r3, 0x0, 0x2c, &(0x7f0000000600)={0x0, {{0x2, 0x4e24}}, {{0x2, 0x4e21, @multicast2}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r5 = openat$cgroup_procs(r4, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') r6 = dup2(r4, r5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000000580)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) socket$nl_crypto(0x10, 0x3, 0x15) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r1) syncfs(r6) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000840)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000740)='./file0/file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={r7, r8, r9}, 0xc) creat(&(0x7f0000000400)='./file1\x00', 0x8) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r6, &(0x7f0000000240)={0x4}) [ 1934.092502] loop1: rw=1, want=133, limit=112 [ 1934.098042] loop5: rw=1, want=14582, limit=112 [ 1934.116306] attempt to access beyond end of device [ 1934.121283] loop4: rw=1, want=4237, limit=112 [ 1934.126663] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1934.134529] FAT-fs (loop1): Filesystem has been set read-only [ 1934.146395] attempt to access beyond end of device 03:36:32 executing program 3: clone(0x104e00, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) keyctl$set_reqkey_keyring(0x4, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x3) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0x0) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b00)={@local}, &(0x7f0000000b40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in=@remote, @in=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f00000067c0), 0x0, 0x0, &(0x7f0000006940)={0x0, 0x989680}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006980)={{{@in=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000006a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000b780)={0x0, @broadcast, @broadcast}, &(0x7f000000b7c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000b800)={@mcast2}, &(0x7f000000b840)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b880)={{{@in=@loopback, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f000000b980)=0xe8) [ 1934.196079] loop5: rw=1, want=14583, limit=112 [ 1934.264214] attempt to access beyond end of device 03:36:33 executing program 5: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) setsockopt$inet_group_source_req(r3, 0x0, 0x2c, &(0x7f0000000600)={0x0, {{0x2, 0x4e24}}, {{0x2, 0x4e21, @multicast2}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r5 = openat$cgroup_procs(r4, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') r6 = dup2(r4, r5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000000580)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) socket$nl_crypto(0x10, 0x3, 0x15) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r1) syncfs(r6) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000840)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000740)='./file0/file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={r7, r8, r9}, 0xc) creat(&(0x7f0000000400)='./file1\x00', 0x8) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r6, &(0x7f0000000240)={0x4}) [ 1934.296300] loop5: rw=1, want=14584, limit=112 [ 1934.301437] attempt to access beyond end of device [ 1934.313266] attempt to access beyond end of device 03:36:33 executing program 2: r0 = socket$unix(0x1, 0x3, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r3 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfffffd97) setsockopt$inet_group_source_req(r3, 0x0, 0x2c, &(0x7f0000000600)={0x0, {{0x2, 0x4e24}}, {{0x2, 0x4e21, @multicast2}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept4(r1, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r5 = openat$cgroup_procs(r4, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') r6 = dup2(r4, r5) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r1, &(0x7f0000000580)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) socket$nl_crypto(0x10, 0x3, 0x15) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r1) syncfs(r6) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000840)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000740)='./file0/file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={r7, r8, r9}, 0xc) creat(&(0x7f0000000400)='./file1\x00', 0x8) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r6, &(0x7f0000000240)={0x4}) [ 1934.349848] loop4: rw=1, want=8333, limit=112 [ 1934.355607] loop5: rw=1, want=14585, limit=112 [ 1934.392978] attempt to access beyond end of device [ 1934.399827] attempt to access beyond end of device [ 1934.414428] loop4: rw=1, want=12429, limit=112 [ 1934.446909] attempt to access beyond end of device [ 1934.449818] loop5: rw=1, want=14606, limit=112 [ 1934.457672] loop4: rw=1, want=16525, limit=112 03:36:33 executing program 1: msgget$private(0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000140)={0x50}, 0x50) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000780)={@mcast1}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000900)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c40)={@loopback, @multicast2}, &(0x7f0000000c80)=0xc) recvmsg(0xffffffffffffffff, &(0x7f0000003140)={&(0x7f0000000cc0)=@xdp, 0x80, &(0x7f00000020c0), 0x0, &(0x7f0000002140)=""/4096, 0x1000}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000cd40), 0x0, 0x0, &(0x7f000000cfc0)={0x77359400}) accept$packet(0xffffffffffffffff, &(0x7f000000d000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000d040)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000f140), &(0x7f000000f180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000f1c0)={@local}, &(0x7f000000f200)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000f240)={{{@in=@rand_addr, @in6=@local}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f000000f340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000f600)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000f700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000f740)={{{@in=@loopback, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f000000f840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000f880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000f8c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000f900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000f940)=0x14) getsockname(0xffffffffffffffff, &(0x7f000000fe40)=@xdp, &(0x7f000000fec0)=0x80) [ 1934.493746] attempt to access beyond end of device [ 1934.501422] loop5: rw=1, want=14607, limit=112 [ 1934.536061] attempt to access beyond end of device 03:36:33 executing program 0: socket$netlink(0x10, 0x3, 0xa) socket$inet6(0xa, 0x0, 0x2) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xd, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r2 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r2, 0x8, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x1ff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r2, 0x7005) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getresuid(&(0x7f0000000280), &(0x7f0000000600), &(0x7f0000000640)) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000007c0)={0x0, {{0x2, 0x4e24, @rand_addr=0xff0000000}}}, 0x88) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8010, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000140)={r4}) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv6_getmulticast={0x14, 0x3a, 0xa0431baec83fd636, 0x70bd27, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x2404c8c4) eventfd2(0x0, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000340)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000000c0)={r6}) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x84) [ 1934.569891] attempt to access beyond end of device [ 1934.571781] loop5: rw=1, want=14608, limit=112 [ 1934.580657] loop4: rw=1, want=20621, limit=112 [ 1934.595111] attempt to access beyond end of device [ 1934.626598] loop5: rw=1, want=14609, limit=112 [ 1934.670297] attempt to access beyond end of device [ 1934.674329] attempt to access beyond end of device [ 1934.687365] loop5: rw=1, want=14658, limit=112 [ 1934.714008] attempt to access beyond end of device [ 1934.738589] loop4: rw=1, want=24717, limit=112 [ 1934.747221] loop5: rw=1, want=14659, limit=112 [ 1934.778888] attempt to access beyond end of device [ 1934.807439] loop5: rw=1, want=14660, limit=112 [ 1934.826548] attempt to access beyond end of device [ 1934.840865] loop5: rw=1, want=14661, limit=112 03:36:33 executing program 2: socket$netlink(0x10, 0x3, 0xa) socket$inet6(0xa, 0x0, 0x2) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xd, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r2 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r2, 0x8, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x1ff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r2, 0x7005) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getresuid(&(0x7f0000000280), &(0x7f0000000600), &(0x7f0000000640)) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000007c0)={0x0, {{0x2, 0x4e24, @rand_addr=0xff0000000}}}, 0x88) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8010, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000140)={r4}) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv6_getmulticast={0x14, 0x3a, 0xa0431baec83fd636, 0x70bd27, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x2404c8c4) eventfd2(0x0, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000340)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000000c0)={r6}) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x84) [ 1934.971192] FAT-fs (loop5): error, invalid access to FAT (entry 0x0000641a) [ 1934.978481] FAT-fs (loop5): Filesystem has been set read-only [ 1934.988968] attempt to access beyond end of device 03:36:33 executing program 0: socket$netlink(0x10, 0x3, 0xa) socket$inet6(0xa, 0x0, 0x2) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xd, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r2 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r2, 0x8, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x1ff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r2, 0x7005) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getresuid(&(0x7f0000000280), &(0x7f0000000600), &(0x7f0000000640)) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000007c0)={0x0, {{0x2, 0x4e24, @rand_addr=0xff0000000}}}, 0x88) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8010, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000140)={r4}) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv6_getmulticast={0x14, 0x3a, 0xa0431baec83fd636, 0x70bd27, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x2404c8c4) eventfd2(0x0, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000340)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000000c0)={r6}) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x84) [ 1935.057180] loop4: rw=1, want=28813, limit=112 [ 1935.149236] page:ffffea00064dabc0 count:0 mapcount:0 mapping:dead000000000400 index:0x1 compound_mapcount: 0 [ 1935.310277] flags: 0x2fffc0000000000() 03:36:34 executing program 2: socket$netlink(0x10, 0x3, 0xa) socket$inet6(0xa, 0x0, 0x2) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xd, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r2 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r2, 0x8, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x1ff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r2, 0x7005) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getresuid(&(0x7f0000000280), &(0x7f0000000600), &(0x7f0000000640)) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000007c0)={0x0, {{0x2, 0x4e24, @rand_addr=0xff0000000}}}, 0x88) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8010, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000140)={r4}) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv6_getmulticast={0x14, 0x3a, 0xa0431baec83fd636, 0x70bd27, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x2404c8c4) eventfd2(0x0, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000340)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000000c0)={r6}) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x84) [ 1935.359244] raw: 02fffc0000000000 ffffea00064dab81 ffffffff00000101 dead000000000400 03:36:34 executing program 3: clone(0x104e00, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) keyctl$set_reqkey_keyring(0x4, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x3) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0x0) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b00)={@local}, &(0x7f0000000b40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in=@remote, @in=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f00000067c0), 0x0, 0x0, &(0x7f0000006940)={0x0, 0x989680}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006980)={{{@in=@local, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000006a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000b780)={0x0, @broadcast, @broadcast}, &(0x7f000000b7c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000b800)={@mcast2}, &(0x7f000000b840)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b880)={{{@in=@loopback, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f000000b980)=0xe8) [ 1935.472570] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 1935.506896] page dumped because: VM_BUG_ON_PAGE(PageTail(page)) 03:36:34 executing program 1: msgget$private(0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000140)={0x50}, 0x50) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000780)={@mcast1}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000900)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c40)={@loopback, @multicast2}, &(0x7f0000000c80)=0xc) recvmsg(0xffffffffffffffff, &(0x7f0000003140)={&(0x7f0000000cc0)=@xdp, 0x80, &(0x7f00000020c0), 0x0, &(0x7f0000002140)=""/4096, 0x1000}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000cd40), 0x0, 0x0, &(0x7f000000cfc0)={0x77359400}) accept$packet(0xffffffffffffffff, &(0x7f000000d000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000d040)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000f140), &(0x7f000000f180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000f1c0)={@local}, &(0x7f000000f200)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000f240)={{{@in=@rand_addr, @in6=@local}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f000000f340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000f600)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000f700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000f740)={{{@in=@loopback, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f000000f840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000f880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000f8c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000f900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000f940)=0x14) getsockname(0xffffffffffffffff, &(0x7f000000fe40)=@xdp, &(0x7f000000fec0)=0x80) [ 1935.528152] ------------[ cut here ]------------ [ 1935.532928] kernel BUG at include/linux/page-flags.h:273! [ 1935.603068] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1935.608480] CPU: 1 PID: 9734 Comm: kworker/u4:1 Not tainted 4.19.0-rc4+ #18 [ 1935.615576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1935.624958] Workqueue: writeback wb_workfn (flush-7:4) [ 1935.630275] RIP: 0010:end_page_writeback+0x769/0x950 [ 1935.635392] Code: ff e8 6b 25 e2 ff 48 8b 85 30 fe ff ff 4c 8d 70 ff e9 d9 fa ff ff e8 56 25 e2 ff 48 c7 c6 e0 24 12 88 48 89 df e8 a7 cc 13 00 <0f> 0b e8 40 25 e2 ff 48 c7 c6 60 25 12 88 48 89 df e8 91 cc 13 00 [ 1935.654300] RSP: 0018:ffff8801b91e5288 EFLAGS: 00010246 [ 1935.659676] RAX: 0000000000000000 RBX: ffffea00064dabc0 RCX: 0000000000000000 [ 1935.666960] RDX: 0000000000000000 RSI: ffffffff81b08db9 RDI: ffffed003723ca42 [ 1935.674238] RBP: ffff8801b91e5460 R08: ffff880157a40400 R09: ffffed003b5e4fe8 [ 1935.679541] kobject: 'loop0' (00000000d6ad330d): kobject_uevent_env [ 1935.681510] R10: ffffed003b5e4fe8 R11: ffff8801daf27f47 R12: 0000000000000001 [ 1935.681521] R13: 1ffff1003723ca53 R14: 1ffff1003723ca7f R15: dffffc0000000000 [ 1935.681534] FS: 0000000000000000(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 1935.681543] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1935.681557] CR2: 00007f6134b6cc90 CR3: 00000001cc363000 CR4: 00000000001406e0 [ 1935.692518] kobject: 'loop0' (00000000d6ad330d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1935.695213] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1935.695230] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1935.695235] Call Trace: [ 1935.695267] ? generic_write_checks+0x5d0/0x5d0 [ 1935.755053] ? mark_held_locks+0xc7/0x130 [ 1935.759210] ? ktime_get+0x352/0x440 [ 1935.762931] ? graph_lock+0x170/0x170 [ 1935.766747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1935.772288] ? check_preemption_disabled+0x48/0x200 [ 1935.777313] ? check_preemption_disabled+0x48/0x200 [ 1935.782339] ? __lock_is_held+0xb5/0x140 [ 1935.786413] page_endio+0x67c/0xb60 [ 1935.790049] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1935.795593] ? end_page_writeback+0x950/0x950 [ 1935.800091] ? wake_up_klogd+0x11a/0x180 [ 1935.804157] ? blkcg_iolatency_cleanup+0x170/0x170 [ 1935.809086] ? blkcg_iolatency_done_bio+0x5da/0x1280 [ 1935.814202] ? vprintk_emit+0x268/0x930 [ 1935.818187] ? blkcg_iolatency_cleanup+0x170/0x170 [ 1935.823125] ? wake_up_klogd+0x180/0x180 [ 1935.827191] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1935.832814] ? vsnprintf+0x20d/0x1b60 [ 1935.836630] ? pointer+0x990/0x990 [ 1935.840168] ? release_pages+0xab5/0x26a0 [ 1935.844318] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1935.849769] ? bio_disassociate_task+0x2d1/0x6f0 [ 1935.854553] ? graph_lock+0x170/0x170 [ 1935.858358] ? bio_associate_blkg+0x3a0/0x3a0 [ 1935.862859] mpage_end_io+0x144/0x1e0 [ 1935.866670] ? dio_warn_stale_pagecache.cold.20+0x7a/0x7a [ 1935.872226] bio_endio+0x5d2/0xb80 [ 1935.875775] ? bio_dirty_fn+0x460/0x460 [ 1935.879757] ? handle_bad_sector+0x114/0x170 [ 1935.884172] ? part_round_stats+0x780/0x780 [ 1935.888502] ? check_preemption_disabled+0x48/0x200 [ 1935.893529] ? __might_sleep+0x95/0x190 [ 1935.897513] generic_make_request_checks+0x5f6/0x26c0 [ 1935.902716] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1935.908003] ? blk_queue_bypass_end+0x210/0x210 [ 1935.912675] ? blk_queue_enter+0xb4e/0xe80 [ 1935.916923] ? print_usage_bug+0xc0/0xc0 [ 1935.920991] ? blk_exit_rl+0x80/0x80 [ 1935.924716] ? __test_set_page_writeback+0x8ca/0x25c0 [ 1935.929928] ? mark_held_locks+0x130/0x130 [ 1935.934228] ? plist_requeue+0x620/0x620 [ 1935.938307] ? mark_held_locks+0x130/0x130 [ 1935.942565] ? __switch_to_asm+0x34/0x70 [ 1935.946632] ? __switch_to_asm+0x34/0x70 [ 1935.950716] ? mark_held_locks+0x130/0x130 [ 1935.954955] ? graph_lock+0x170/0x170 [ 1935.958757] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1935.964298] ? radix_tree_next_chunk+0x53b/0xdb0 [ 1935.969062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1935.974604] ? page_mapped+0x366/0x810 [ 1935.978504] generic_make_request+0x2bd/0x15a0 [ 1935.983097] ? blk_get_request+0x4e0/0x4e0 [ 1935.987351] ? graph_lock+0x170/0x170 [ 1935.991158] ? graph_lock+0x170/0x170 [ 1935.994965] ? lock_downgrade+0x900/0x900 [ 1935.999117] ? check_preemption_disabled+0x48/0x200 [ 1936.004151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1936.009711] ? check_preemption_disabled+0x48/0x200 [ 1936.014737] ? check_preemption_disabled+0x48/0x200 [ 1936.019765] ? find_held_lock+0x36/0x1c0 [ 1936.023838] ? guard_bio_eod+0x1f4/0x630 [ 1936.027902] ? lock_downgrade+0x900/0x900 [ 1936.032054] ? check_preemption_disabled+0x48/0x200 [ 1936.037086] submit_bio+0xba/0x460 [ 1936.040635] ? submit_bio+0xba/0x460 [ 1936.044351] ? rcu_bh_qs+0xc0/0xc0 [ 1936.047893] ? generic_make_request+0x15a0/0x15a0 [ 1936.052745] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1936.058298] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1936.063326] ? guard_bio_eod+0x2bb/0x630 [ 1936.067402] __mpage_writepage+0x1515/0x1d30 [ 1936.071823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1936.077400] ? clear_page_dirty_for_io+0x58d/0x18f0 [ 1936.082435] ? clean_buffers+0x340/0x340 [ 1936.086501] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1936.091265] ? graph_lock+0x170/0x170 [ 1936.095070] ? retint_kernel+0x2d/0x2d [ 1936.098965] ? graph_lock+0x170/0x170 [ 1936.102772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1936.108308] ? check_preemption_disabled+0x48/0x200 [ 1936.113321] ? check_preemption_disabled+0x48/0x200 [ 1936.118366] write_cache_pages+0xd8e/0x1e50 [ 1936.122704] ? clean_buffers+0x340/0x340 [ 1936.126782] ? clear_page_dirty_for_io+0x18f0/0x18f0 [ 1936.131893] ? cpuacct_charge+0x265/0x440 [ 1936.136065] ? __lock_acquire+0x7ec/0x4ec0 [ 1936.140302] ? update_curr+0x4cf/0xbe0 [ 1936.144195] ? lock_downgrade+0x900/0x900 [ 1936.148348] ? check_preemption_disabled+0x48/0x200 [ 1936.153371] ? mark_held_locks+0x130/0x130 [ 1936.157610] ? print_usage_bug+0xc0/0xc0 [ 1936.161670] ? graph_lock+0x170/0x170 [ 1936.165483] ? check_noncircular+0x20/0x20 [ 1936.169726] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1936.175264] ? check_preemption_disabled+0x48/0x200 [ 1936.180287] ? print_usage_bug+0xc0/0xc0 [ 1936.184791] ? mark_held_locks+0x130/0x130 [ 1936.189035] ? __lock_acquire+0x7ec/0x4ec0 [ 1936.193268] ? zap_class+0x640/0x640 [ 1936.196983] ? rb_next+0x140/0x140 [ 1936.200530] ? blk_start_plug+0xcc/0x370 [ 1936.204597] ? blk_lld_busy+0x70/0x70 [ 1936.208415] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1936.213960] ? fat_add_cluster+0x160/0x160 [ 1936.218197] mpage_writepages+0x14c/0x320 [ 1936.222355] ? mpage_end_io+0x1e0/0x1e0 [ 1936.226328] ? graph_lock+0x170/0x170 [ 1936.230479] ? fat_add_cluster+0x160/0x160 [ 1936.234718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1936.240260] ? check_preemption_disabled+0x48/0x200 [ 1936.245275] ? check_preemption_disabled+0x48/0x200 [ 1936.250308] fat_writepages+0x24/0x30 [ 1936.254116] ? fat_readpages+0x40/0x40 [ 1936.258007] do_writepages+0x9a/0x1a0 [ 1936.261819] __writeback_single_inode+0x20a/0x1620 [ 1936.266748] ? debug_smp_processor_id+0x1c/0x20 [ 1936.271416] ? perf_trace_lock+0x14d/0x7a0 [ 1936.275656] ? __mark_inode_dirty+0x1510/0x1510 [ 1936.280332] ? zap_class+0x640/0x640 [ 1936.284052] ? lock_acquire+0x1ed/0x520 [ 1936.288034] ? find_held_lock+0x36/0x1c0 [ 1936.292101] ? wbc_attach_and_unlock_inode+0x670/0xa30 [ 1936.297382] ? lock_downgrade+0x900/0x900 [ 1936.301534] ? find_held_lock+0x13f/0x1c0 [ 1936.305696] ? kasan_check_read+0x11/0x20 [ 1936.309849] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1936.314263] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1936.318855] ? lock_downgrade+0x900/0x900 [ 1936.323014] ? _raw_spin_unlock+0x2c/0x50 [ 1936.327165] ? wbc_attach_and_unlock_inode+0x675/0xa30 [ 1936.332442] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1936.337024] ? __writeback_single_inode+0x1620/0x1620 [ 1936.342225] ? kasan_check_write+0x14/0x20 [ 1936.346462] ? do_raw_spin_lock+0xc1/0x200 [ 1936.350710] writeback_sb_inodes+0x71f/0x11d0 [ 1936.355237] ? wbc_detach_inode+0x940/0x940 [ 1936.359558] ? check_preemption_disabled+0x48/0x200 [ 1936.364602] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1936.370136] ? queue_io+0x3dd/0x800 [ 1936.373764] ? debug_smp_processor_id+0x1c/0x20 [ 1936.378442] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1936.383988] __writeback_inodes_wb+0x1b9/0x340 [ 1936.388581] ? writeback_sb_inodes+0x11d0/0x11d0 [ 1936.393338] ? __lock_is_held+0xb5/0x140 [ 1936.397415] wb_writeback+0xa73/0xfc0 [ 1936.401233] ? writeback_inodes_wb.constprop.49+0x330/0x330 [ 1936.406946] ? widen_string+0xe0/0x2e0 [ 1936.410842] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1936.416039] ? print_usage_bug+0xc0/0xc0 [ 1936.420096] ? graph_lock+0x170/0x170 [ 1936.423896] ? string+0x225/0x2d0 [ 1936.427353] ? widen_string+0x2e0/0x2e0 [ 1936.431330] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1936.436344] ? find_next_bit+0x104/0x130 [ 1936.440412] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1936.445429] ? find_next_bit+0x104/0x130 [ 1936.449496] ? cpumask_next+0x41/0x50 [ 1936.453301] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1936.458322] ? get_nr_dirty_inodes+0xd6/0x130 [ 1936.462823] ? __local_bh_enable_ip+0x160/0x260 [ 1936.467502] ? get_nr_dirty_pages+0x17c/0x1f0 [ 1936.472084] ? _raw_spin_unlock_bh+0x30/0x40 [ 1936.476495] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1936.481514] ? wb_split_bdi_pages.isra.28+0x134/0x1b0 [ 1936.486721] ? wb_wait_for_completion+0x2d0/0x2d0 [ 1936.491573] ? wb_workfn+0x521/0x1790 [ 1936.495388] ? __local_bh_enable_ip+0x160/0x260 [ 1936.500065] wb_workfn+0xee9/0x1790 [ 1936.503709] ? __lock_acquire+0x7ec/0x4ec0 [ 1936.507966] ? inode_wait_for_writeback+0x40/0x40 [ 1936.512824] ? mark_held_locks+0x130/0x130 [ 1936.517069] ? try_to_wake_up+0x10a/0x12f0 [ 1936.521313] ? lock_downgrade+0x900/0x900 [ 1936.525461] ? lock_downgrade+0x900/0x900 [ 1936.529619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1936.535161] ? check_preemption_disabled+0x48/0x200 [ 1936.540193] ? kthread_data+0x58/0xc0 [ 1936.544001] ? zap_class+0x640/0x640 [ 1936.547734] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1936.552839] ? try_to_wake_up+0x10a/0x12f0 [ 1936.557085] ? graph_lock+0x170/0x170 [ 1936.560896] ? migrate_swap_stop+0x930/0x930 [ 1936.565310] ? debug_object_deactivate+0x2eb/0x450 [ 1936.570249] ? lock_downgrade+0x900/0x900 [ 1936.574414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1936.579963] ? find_held_lock+0x36/0x1c0 [ 1936.584037] ? graph_lock+0x170/0x170 [ 1936.587863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1936.593408] ? check_preemption_disabled+0x48/0x200 [ 1936.598429] ? check_preemption_disabled+0x48/0x200 [ 1936.603458] ? __lock_is_held+0xb5/0x140 [ 1936.607534] process_one_work+0xc90/0x1b90 [ 1936.611774] ? mark_held_locks+0x130/0x130 [ 1936.616019] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 1936.620696] ? __switch_to_asm+0x40/0x70 [ 1936.624761] ? __switch_to_asm+0x34/0x70 [ 1936.628820] ? __switch_to_asm+0x40/0x70 [ 1936.632886] ? __switch_to_asm+0x34/0x70 [ 1936.636949] ? __switch_to_asm+0x40/0x70 [ 1936.641011] ? __switch_to_asm+0x34/0x70 [ 1936.645072] ? __switch_to_asm+0x40/0x70 [ 1936.649144] ? __schedule+0x874/0x1ed0 [ 1936.653032] ? check_preemption_disabled+0x48/0x200 [ 1936.658067] ? graph_lock+0x170/0x170 [ 1936.661870] ? lock_downgrade+0x900/0x900 [ 1936.666029] ? trace_hardirqs_off+0xb8/0x310 [ 1936.670443] ? kasan_check_read+0x11/0x20 [ 1936.674594] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1936.679105] ? find_held_lock+0x36/0x1c0 [ 1936.683178] ? lock_acquire+0x1ed/0x520 [ 1936.687159] ? worker_thread+0x3e0/0x1390 [ 1936.691340] ? lock_release+0x970/0x970 [ 1936.695323] ? trace_hardirqs_off+0xb8/0x310 [ 1936.699736] ? kasan_check_read+0x11/0x20 [ 1936.703887] ? worker_thread+0x3e0/0x1390 [ 1936.708055] ? trace_hardirqs_on+0x310/0x310 [ 1936.712472] ? kasan_check_write+0x14/0x20 [ 1936.716717] ? do_raw_spin_lock+0xc1/0x200 [ 1936.720964] worker_thread+0x17f/0x1390 [ 1936.724943] ? __switch_to_asm+0x34/0x70 [ 1936.729018] ? process_one_work+0x1b90/0x1b90 [ 1936.733522] ? graph_lock+0x170/0x170 [ 1936.737330] ? __sched_text_start+0x8/0x8 [ 1936.741491] ? find_held_lock+0x36/0x1c0 [ 1936.745563] ? __kthread_parkme+0xce/0x1a0 [ 1936.749803] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1936.754926] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1936.760032] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1936.764617] ? trace_hardirqs_on+0xbd/0x310 [ 1936.768971] ? kasan_check_read+0x11/0x20 [ 1936.773124] ? __kthread_parkme+0xce/0x1a0 [ 1936.777361] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1936.782821] ? kasan_check_write+0x14/0x20 [ 1936.787056] ? do_raw_spin_lock+0xc1/0x200 [ 1936.791296] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1936.796404] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1936.801940] ? __kthread_parkme+0xfb/0x1a0 03:36:34 executing program 0: socket$netlink(0x10, 0x3, 0xa) socket$inet6(0xa, 0x0, 0x2) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xd, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r2 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r2, 0x8, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x1ff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r2, 0x7005) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getresuid(&(0x7f0000000280), &(0x7f0000000600), &(0x7f0000000640)) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000007c0)={0x0, {{0x2, 0x4e24, @rand_addr=0xff0000000}}}, 0x88) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8010, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000140)={r4}) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv6_getmulticast={0x14, 0x3a, 0xa0431baec83fd636, 0x70bd27, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x2404c8c4) eventfd2(0x0, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000340)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000000c0)={r6}) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x84) [ 1936.806182] kthread+0x35a/0x420 [ 1936.809551] ? process_one_work+0x1b90/0x1b90 [ 1936.814063] ? kthread_bind+0x40/0x40 [ 1936.817871] ret_from_fork+0x3a/0x50 [ 1936.821593] Modules linked in: [ 1936.832978] kobject: 'loop5' (0000000003a73ee3): kobject_uevent_env [ 1936.839437] kobject: 'loop5' (0000000003a73ee3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1936.839729] ---[ end trace b1bf6d33e16c103c ]--- [ 1936.868641] RIP: 0010:end_page_writeback+0x769/0x950 [ 1936.882515] Code: ff e8 6b 25 e2 ff 48 8b 85 30 fe ff ff 4c 8d 70 ff e9 d9 fa ff ff e8 56 25 e2 ff 48 c7 c6 e0 24 12 88 48 89 df e8 a7 cc 13 00 <0f> 0b e8 40 25 e2 ff 48 c7 c6 60 25 12 88 48 89 df e8 91 cc 13 00 [ 1936.932383] RSP: 0018:ffff8801b91e5288 EFLAGS: 00010246 [ 1936.937815] RAX: 0000000000000000 RBX: ffffea00064dabc0 RCX: 0000000000000000 [ 1936.966735] RDX: 0000000000000000 RSI: ffffffff81b08db9 RDI: ffffed003723ca42 [ 1937.000004] kobject: 'loop2' (0000000001c28b7c): kobject_uevent_env [ 1937.006584] RBP: ffff8801b91e5460 R08: ffff880157a40400 R09: ffffed003b5e4fe8 [ 1937.008865] kobject: 'loop2' (0000000001c28b7c): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1937.022389] R10: ffffed003b5e4fe8 R11: ffff8801daf27f47 R12: 0000000000000001 [ 1937.033213] R13: 1ffff1003723ca53 R14: 1ffff1003723ca7f R15: dffffc0000000000 [ 1937.040563] FS: 0000000000000000(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 1937.055014] kobject: 'loop3' (0000000091672ed1): kobject_uevent_env [ 1937.062338] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1937.068887] kobject: 'loop3' (0000000091672ed1): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1937.079475] CR2: 0000001b3202d000 CR3: 00000001cad9f000 CR4: 00000000001406e0 [ 1937.088631] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1937.097897] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1937.105661] Kernel panic - not syncing: Fatal exception [ 1937.112036] Kernel Offset: disabled [ 1937.115655] Rebooting in 86400 seconds..