INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.41' (ECDSA) to the list of known hosts. 2018/09/18 06:45:18 fuzzer started 2018/09/18 06:45:21 dialing manager at 10.128.0.26:33535 2018/09/18 06:45:26 syscalls: 1 2018/09/18 06:45:26 code coverage: enabled 2018/09/18 06:45:26 comparison tracing: enabled 2018/09/18 06:45:26 setuid sandbox: enabled 2018/09/18 06:45:26 namespace sandbox: enabled 2018/09/18 06:45:26 fault injection: enabled 2018/09/18 06:45:26 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/18 06:45:26 net packed injection: enabled 2018/09/18 06:45:26 net device setup: enabled 06:47:46 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x3) close(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@ipv4={[], [], @loopback}}, &(0x7f0000000340)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)={@mcast1}, &(0x7f00000004c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'veth1_to_team\x00'}) accept(0xffffffffffffffff, &(0x7f0000000540)=@hci, &(0x7f00000005c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000740)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000002f00)=@xdp, &(0x7f0000002f80)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002fc0), &(0x7f0000003000)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003100)={@empty, @multicast2}, &(0x7f0000003140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003180)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000003280)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000032c0)={{{@in=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f00000033c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003400)={{{@in6, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000003500)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003540)={{{@in=@local, @in6=@local}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000036c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003700)={'ip6gre0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003740)={0x0, @loopback, @rand_addr}, &(0x7f0000000240)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003a40)={{{@in6=@mcast1, @in6=@mcast1}}, {{}, 0x0, @in=@local}}, &(0x7f0000003b40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c00)={{{@in6=@dev, @in=@multicast2}}, {{@in6}, 0x0, @in6}}, &(0x7f0000003d00)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004d80)={0x0, @remote}, &(0x7f0000004dc0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000dc80), 0x0, 0x0, &(0x7f000000dec0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dfc0)={{{@in6, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f000000e0c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000e100)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f000000e200)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000e240)={{{@in=@broadcast, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000e340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000013740)={@mcast2}, &(0x7f0000013780)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000013a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000013a80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000013b80)={{{@in=@broadcast, @in=@remote}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000013c80)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000013cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000013d00)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000013d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000013dc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013e00)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000013f00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013f40)={@remote}, &(0x7f0000013f80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000014280)={{{@in6, @in6=@ipv4={[], [], @local}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000014380)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000143c0)={0x0, @multicast1, @dev}, &(0x7f0000014400)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000014440)={{{@in6, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000014540)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000015200)={&(0x7f0000000180), 0xc, &(0x7f00000151c0)={&(0x7f0000000880)=ANY=[]}}, 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="f8805da01d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df9f3f") 06:47:46 executing program 1: select(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000340)='#&\'eth0!GPL.]-[]\\\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) fstatfs(0xffffffffffffffff, &(0x7f0000000380)=""/33) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000400)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") creat(&(0x7f0000000180)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000300)) utimensat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f00000003c0)={{0x0, 0x2710}}, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) 06:47:46 executing program 5: signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000580)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000140), 0x4) timerfd_create(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) socket$inet_dccp(0x2, 0x6, 0x0) sysinfo(&(0x7f0000000b40)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)={@mcast2}, &(0x7f0000000400)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000002f00), 0x0, 0x0, &(0x7f0000003080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003300)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000003400)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003500)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000003600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003640)={{{@in=@rand_addr, @in6}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000003740)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003780)={{{@in=@local, @in=@local}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000003880)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000003c40)={&(0x7f00000002c0), 0xc, &(0x7f0000003c00)={&(0x7f00000038c0)=ANY=[]}}, 0x0) timerfd_create(0x0, 0x0) 06:47:46 executing program 2: getitimer(0x1, &(0x7f0000000000)) ustat(0x0, &(0x7f0000000280)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000640)={'ip6gre0\x00', @ifru_data=&(0x7f0000000600)="55a7d3de2425f647cea8481bc319f20e48470ba0a9a84621dbf14d0b1a90f383"}) creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000680)={0x2, 0x0, @broadcast}, &(0x7f00000006c0)=0x10) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") syz_extract_tcp_res(&(0x7f00000002c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0xff34, 0x0) 06:47:46 executing program 3: utime(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) inotify_init1(0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000400)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580), &(0x7f0000000980), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000e80)='encrypted\x00', &(0x7f0000000ec0), &(0x7f0000000f00)='user\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000e00), 0x0, 0x0) gettid() pipe(&(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000bc0)="42805da0a95dde0f3a6086a3088041cb913591913d0629007899442a417934c8c8eefa6466410f51cc302fd0d0451f2e1a3828c40379dfb8d6adbe90dfe29f7f") fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_execute_func(&(0x7f00000004c0)="42805da012d8deedd9f78585ce13e5ce19fa380f38213918f35bf35b768cc8000000c481b5e5bc2b00000021c4e2799c186b2179dae5e54175450f2e1af30f8225e39f7cc24444ededfb0707") 06:47:46 executing program 4: mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x0) add_key(&(0x7f00000006c0)='.request_key_auth\x00', &(0x7f0000000700), &(0x7f0000000740), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000880)='pkcs7_test\x00', &(0x7f00000008c0), &(0x7f0000000900)='syzkaller\x00', 0xfffffffffffffff8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000840), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000540)) sysinfo(&(0x7f00000003c0)=""/81) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)={'#! ', './file0'}, 0xb) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000780)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0x280, 0x0, 0x280, 0x130, 0x130, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x4, &(0x7f0000000040), {[{{@ipv6={@mcast1, @dev, [], [], 'tunl0\x00', 'irlan0\x00'}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xc8, 0x100}, @common=@inet=@SET3={0x38, 'SET\x00'}}, {{@ipv6={@dev, @mcast1, [], [], 'veth1_to_bond\x00', 'ifb0\x00'}, 0x0, 0xc8, 0xf8}, @common=@inet=@SET2={0x30, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") syzkaller login: [ 182.232449] IPVS: ftp: loaded support on port[0] = 21 [ 182.240993] IPVS: ftp: loaded support on port[0] = 21 [ 182.252749] IPVS: ftp: loaded support on port[0] = 21 [ 182.264771] IPVS: ftp: loaded support on port[0] = 21 [ 182.297780] IPVS: ftp: loaded support on port[0] = 21 [ 182.300904] IPVS: ftp: loaded support on port[0] = 21 [ 184.320272] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.342504] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.365327] device bridge_slave_0 entered promiscuous mode [ 184.481357] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.500178] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.520296] device bridge_slave_1 entered promiscuous mode [ 184.540208] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.548970] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.556721] device bridge_slave_0 entered promiscuous mode [ 184.565400] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.571762] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.604216] device bridge_slave_0 entered promiscuous mode [ 184.638747] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.645395] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.652753] device bridge_slave_1 entered promiscuous mode [ 184.668207] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 184.688132] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.699381] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.714436] device bridge_slave_0 entered promiscuous mode [ 184.736378] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.742736] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.758840] device bridge_slave_1 entered promiscuous mode [ 184.771625] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.793470] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.801041] device bridge_slave_0 entered promiscuous mode [ 184.812393] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 184.825470] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.831901] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.840202] device bridge_slave_1 entered promiscuous mode [ 184.849180] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 184.860088] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 184.869872] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.878516] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.901739] device bridge_slave_0 entered promiscuous mode [ 184.925561] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 184.935549] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.942644] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.951474] device bridge_slave_1 entered promiscuous mode [ 184.978185] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 185.005690] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 185.039495] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.063716] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.071073] device bridge_slave_1 entered promiscuous mode [ 185.122330] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 185.134698] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 185.209405] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 185.261288] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 185.299464] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.319077] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 185.335279] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.414815] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.430824] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.485286] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.554361] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.580185] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.592644] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.692785] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.732671] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.760262] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.833578] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 185.840450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.885317] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.896742] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 185.932436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.986218] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 185.995282] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 186.003213] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.017687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.034796] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 186.043542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.148605] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 186.172087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.217095] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 186.234785] team0: Port device team_slave_0 added [ 186.246670] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 186.254975] team0: Port device team_slave_0 added [ 186.270226] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 186.293952] team0: Port device team_slave_0 added [ 186.333666] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 186.347368] team0: Port device team_slave_0 added [ 186.358802] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 186.380201] team0: Port device team_slave_1 added [ 186.410716] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 186.434444] team0: Port device team_slave_1 added [ 186.444901] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 186.452277] team0: Port device team_slave_1 added [ 186.472549] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 186.484851] team0: Port device team_slave_1 added [ 186.496457] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 186.511007] team0: Port device team_slave_0 added [ 186.518397] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.537494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.592442] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.610837] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 186.622277] team0: Port device team_slave_0 added [ 186.645174] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.664445] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 186.684518] team0: Port device team_slave_1 added [ 186.713524] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 186.724574] team0: Port device team_slave_1 added [ 186.731666] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.744732] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.752523] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.794342] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 186.803670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.811678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.844548] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 186.852217] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.876579] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.904142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.923894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.937282] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 186.947380] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 186.957832] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 186.969192] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 186.994188] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.007193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.015938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.043405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.051255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.064015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.075399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.084261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.092944] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 187.104250] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 187.117909] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 187.149565] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 187.173569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.190534] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.199871] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.214942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.222812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.231581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.239553] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.247603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.256546] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 187.279192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.303858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.312142] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 187.324254] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 187.341639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.370752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.399409] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.414525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.469501] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 187.489546] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.512106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.537161] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 187.559196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.567361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.410674] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.417281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.424336] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.430704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.438933] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 188.561513] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.569358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.576094] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.582472] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.591955] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 188.732405] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.738843] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.745560] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.751941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.767584] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 188.821179] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.827633] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.834340] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.840712] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.866680] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 188.888296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.902390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.924988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.932203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.980886] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.987333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.994064] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.000433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.032655] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 189.182948] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.189385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.196133] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.202504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.229382] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 189.893254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.900556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.464706] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.752869] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.854104] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.888700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.909251] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 194.049766] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.193351] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 194.302833] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.343292] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 194.349457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.363215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.399028] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 194.408081] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 194.574550] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 194.673876] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 194.680041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.687899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.712991] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 194.833909] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.850017] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 194.866509] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 194.875218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.882313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.924244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.931434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.108786] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 195.120572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.131382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.170370] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 195.202402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.217870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.237047] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.352004] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.380424] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.632277] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.679892] 8021q: adding VLAN 0 to HW filter on device team0 06:48:03 executing program 3: utime(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) inotify_init1(0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000400)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580), &(0x7f0000000980), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000e80)='encrypted\x00', &(0x7f0000000ec0), &(0x7f0000000f00)='user\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000e00), 0x0, 0x0) gettid() pipe(&(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000bc0)="42805da0a95dde0f3a6086a3088041cb913591913d0629007899442a417934c8c8eefa6466410f51cc302fd0d0451f2e1a3828c40379dfb8d6adbe90dfe29f7f") fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_execute_func(&(0x7f00000004c0)="42805da012d8deedd9f78585ce13e5ce19fa380f38213918f35bf35b768cc8000000c481b5e5bc2b00000021c4e2799c186b2179dae5e54175450f2e1af30f8225e39f7cc24444ededfb0707") 06:48:03 executing program 3: utime(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) inotify_init1(0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000400)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580), &(0x7f0000000980), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000e80)='encrypted\x00', &(0x7f0000000ec0), &(0x7f0000000f00)='user\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000e00), 0x0, 0x0) gettid() pipe(&(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000bc0)="42805da0a95dde0f3a6086a3088041cb913591913d0629007899442a417934c8c8eefa6466410f51cc302fd0d0451f2e1a3828c40379dfb8d6adbe90dfe29f7f") fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_execute_func(&(0x7f00000004c0)="42805da012d8deedd9f78585ce13e5ce19fa380f38213918f35bf35b768cc8000000c481b5e5bc2b00000021c4e2799c186b2179dae5e54175450f2e1af30f8225e39f7cc24444ededfb0707") 06:48:03 executing program 1: select(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000340)='#&\'eth0!GPL.]-[]\\\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) fstatfs(0xffffffffffffffff, &(0x7f0000000380)=""/33) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000400)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") creat(&(0x7f0000000180)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000300)) utimensat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f00000003c0)={{0x0, 0x2710}}, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) 06:48:03 executing program 3: utime(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) inotify_init1(0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000400)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580), &(0x7f0000000980), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000e80)='encrypted\x00', &(0x7f0000000ec0), &(0x7f0000000f00)='user\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000e00), 0x0, 0x0) gettid() pipe(&(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000bc0)="42805da0a95dde0f3a6086a3088041cb913591913d0629007899442a417934c8c8eefa6466410f51cc302fd0d0451f2e1a3828c40379dfb8d6adbe90dfe29f7f") fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_execute_func(&(0x7f00000004c0)="42805da012d8deedd9f78585ce13e5ce19fa380f38213918f35bf35b768cc8000000c481b5e5bc2b00000021c4e2799c186b2179dae5e54175450f2e1af30f8225e39f7cc24444ededfb0707") 06:48:03 executing program 4: mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x0) add_key(&(0x7f00000006c0)='.request_key_auth\x00', &(0x7f0000000700), &(0x7f0000000740), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000880)='pkcs7_test\x00', &(0x7f00000008c0), &(0x7f0000000900)='syzkaller\x00', 0xfffffffffffffff8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000840), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000540)) sysinfo(&(0x7f00000003c0)=""/81) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)={'#! ', './file0'}, 0xb) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000780)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0x280, 0x0, 0x280, 0x130, 0x130, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x4, &(0x7f0000000040), {[{{@ipv6={@mcast1, @dev, [], [], 'tunl0\x00', 'irlan0\x00'}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xc8, 0x100}, @common=@inet=@SET3={0x38, 'SET\x00'}}, {{@ipv6={@dev, @mcast1, [], [], 'veth1_to_bond\x00', 'ifb0\x00'}, 0x0, 0xc8, 0xf8}, @common=@inet=@SET2={0x30, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 06:48:03 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x3) close(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@ipv4={[], [], @loopback}}, &(0x7f0000000340)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)={@mcast1}, &(0x7f00000004c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'veth1_to_team\x00'}) accept(0xffffffffffffffff, &(0x7f0000000540)=@hci, &(0x7f00000005c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000740)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000002f00)=@xdp, &(0x7f0000002f80)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002fc0), &(0x7f0000003000)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003100)={@empty, @multicast2}, &(0x7f0000003140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003180)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000003280)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000032c0)={{{@in=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f00000033c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003400)={{{@in6, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000003500)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003540)={{{@in=@local, @in6=@local}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000036c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003700)={'ip6gre0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003740)={0x0, @loopback, @rand_addr}, &(0x7f0000000240)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003a40)={{{@in6=@mcast1, @in6=@mcast1}}, {{}, 0x0, @in=@local}}, &(0x7f0000003b40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c00)={{{@in6=@dev, @in=@multicast2}}, {{@in6}, 0x0, @in6}}, &(0x7f0000003d00)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004d80)={0x0, @remote}, &(0x7f0000004dc0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000dc80), 0x0, 0x0, &(0x7f000000dec0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dfc0)={{{@in6, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f000000e0c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000e100)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f000000e200)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000e240)={{{@in=@broadcast, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000e340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000013740)={@mcast2}, &(0x7f0000013780)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000013a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000013a80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000013b80)={{{@in=@broadcast, @in=@remote}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000013c80)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000013cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000013d00)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000013d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000013dc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013e00)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000013f00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013f40)={@remote}, &(0x7f0000013f80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000014280)={{{@in6, @in6=@ipv4={[], [], @local}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000014380)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000143c0)={0x0, @multicast1, @dev}, &(0x7f0000014400)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000014440)={{{@in6, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000014540)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000015200)={&(0x7f0000000180), 0xc, &(0x7f00000151c0)={&(0x7f0000000880)=ANY=[]}}, 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="f8805da01d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df9f3f") 06:48:03 executing program 5: signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000580)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000140), 0x4) timerfd_create(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) socket$inet_dccp(0x2, 0x6, 0x0) sysinfo(&(0x7f0000000b40)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)={@mcast2}, &(0x7f0000000400)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000002f00), 0x0, 0x0, &(0x7f0000003080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003300)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000003400)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003500)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000003600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003640)={{{@in=@rand_addr, @in6}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000003740)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003780)={{{@in=@local, @in=@local}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000003880)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000003c40)={&(0x7f00000002c0), 0xc, &(0x7f0000003c00)={&(0x7f00000038c0)=ANY=[]}}, 0x0) timerfd_create(0x0, 0x0) 06:48:03 executing program 3: memfd_create(&(0x7f0000000040)='eth0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7}, 0x7) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080), 0xc) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001800)="408055a0496969ef69dc00d9c421a05d2f8a20a4a10fd84167c3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0f0ff90cd9ec1a1a00460dc4210311cef045fe810c0000009f") semget$private(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000a00), 0x0, 0x0, &(0x7f0000000a40)={0x0, 0x1c9c380}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000280)=""/16) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000040), 0x0) clock_gettime(0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380), 0x4) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0xd14b, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) clock_settime(0x0, &(0x7f00000002c0)={0x0, 0x1c9c380}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) stat(&(0x7f00000006c0)='./file1\x00', &(0x7f0000000a80)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@rand_addr, @in6=@loopback}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000700)='cifs.idmap\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240), &(0x7f0000000980), 0x0, 0xfffffffffffffffc) 06:48:04 executing program 4: mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x0) add_key(&(0x7f00000006c0)='.request_key_auth\x00', &(0x7f0000000700), &(0x7f0000000740), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000880)='pkcs7_test\x00', &(0x7f00000008c0), &(0x7f0000000900)='syzkaller\x00', 0xfffffffffffffff8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000840), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000540)) sysinfo(&(0x7f00000003c0)=""/81) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)={'#! ', './file0'}, 0xb) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000780)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0x280, 0x0, 0x280, 0x130, 0x130, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x4, &(0x7f0000000040), {[{{@ipv6={@mcast1, @dev, [], [], 'tunl0\x00', 'irlan0\x00'}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xc8, 0x100}, @common=@inet=@SET3={0x38, 'SET\x00'}}, {{@ipv6={@dev, @mcast1, [], [], 'veth1_to_bond\x00', 'ifb0\x00'}, 0x0, 0xc8, 0xf8}, @common=@inet=@SET2={0x30, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 06:48:04 executing program 2: getitimer(0x1, &(0x7f0000000000)) ustat(0x0, &(0x7f0000000280)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000640)={'ip6gre0\x00', @ifru_data=&(0x7f0000000600)="55a7d3de2425f647cea8481bc319f20e48470ba0a9a84621dbf14d0b1a90f383"}) creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000680)={0x2, 0x0, @broadcast}, &(0x7f00000006c0)=0x10) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") syz_extract_tcp_res(&(0x7f00000002c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0xff34, 0x0) 06:48:04 executing program 1: select(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000340)='#&\'eth0!GPL.]-[]\\\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) fstatfs(0xffffffffffffffff, &(0x7f0000000380)=""/33) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000400)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") creat(&(0x7f0000000180)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000300)) utimensat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f00000003c0)={{0x0, 0x2710}}, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) 06:48:04 executing program 4: mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x0) add_key(&(0x7f00000006c0)='.request_key_auth\x00', &(0x7f0000000700), &(0x7f0000000740), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000880)='pkcs7_test\x00', &(0x7f00000008c0), &(0x7f0000000900)='syzkaller\x00', 0xfffffffffffffff8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000840), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000540)) sysinfo(&(0x7f00000003c0)=""/81) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)={'#! ', './file0'}, 0xb) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000780)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0x280, 0x0, 0x280, 0x130, 0x130, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x4, &(0x7f0000000040), {[{{@ipv6={@mcast1, @dev, [], [], 'tunl0\x00', 'irlan0\x00'}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xc8, 0x100}, @common=@inet=@SET3={0x38, 'SET\x00'}}, {{@ipv6={@dev, @mcast1, [], [], 'veth1_to_bond\x00', 'ifb0\x00'}, 0x0, 0xc8, 0xf8}, @common=@inet=@SET2={0x30, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 06:48:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/xfrm_stat\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 200.484292] hrtimer: interrupt took 71887 ns 06:48:05 executing program 4: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) memfd_create(&(0x7f0000000600)='/dev/fuse\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000340)=ANY=[], &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) kexec_load(0x0, 0x0, &(0x7f0000000640), 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000001840)={{&(0x7f0000000700)=""/185, 0xb9}, &(0x7f00000007c0)}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) unshare(0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000240)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000380)}) socket$alg(0x26, 0x5, 0x0) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000640)=""/168) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000ac0), &(0x7f0000000b40)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000e80)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000f40)=0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000005a00), &(0x7f0000005b00)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000077c0), &(0x7f0000007800)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000007840), &(0x7f0000007980)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000079c0), &(0x7f0000007a00)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000007a40)={0x0, @in={{0x2, 0x0, @remote}}}, &(0x7f0000007b00)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000008f40)={0x0, 0x0, &(0x7f0000008ec0)}, &(0x7f0000008f80)=0x10) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000009180), 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/185) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 06:48:05 executing program 1: select(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000340)='#&\'eth0!GPL.]-[]\\\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) fstatfs(0xffffffffffffffff, &(0x7f0000000380)=""/33) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000400)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") creat(&(0x7f0000000180)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000300)) utimensat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f00000003c0)={{0x0, 0x2710}}, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) 06:48:05 executing program 2: getitimer(0x1, &(0x7f0000000000)) ustat(0x0, &(0x7f0000000280)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000640)={'ip6gre0\x00', @ifru_data=&(0x7f0000000600)="55a7d3de2425f647cea8481bc319f20e48470ba0a9a84621dbf14d0b1a90f383"}) creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000680)={0x2, 0x0, @broadcast}, &(0x7f00000006c0)=0x10) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") syz_extract_tcp_res(&(0x7f00000002c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0xff34, 0x0) 06:48:05 executing program 5: signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000580)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000140), 0x4) timerfd_create(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) socket$inet_dccp(0x2, 0x6, 0x0) sysinfo(&(0x7f0000000b40)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)={@mcast2}, &(0x7f0000000400)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000002f00), 0x0, 0x0, &(0x7f0000003080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003300)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000003400)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003500)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000003600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003640)={{{@in=@rand_addr, @in6}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000003740)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003780)={{{@in=@local, @in=@local}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000003880)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000003c40)={&(0x7f00000002c0), 0xc, &(0x7f0000003c00)={&(0x7f00000038c0)=ANY=[]}}, 0x0) timerfd_create(0x0, 0x0) 06:48:05 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x3) close(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@ipv4={[], [], @loopback}}, &(0x7f0000000340)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)={@mcast1}, &(0x7f00000004c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'veth1_to_team\x00'}) accept(0xffffffffffffffff, &(0x7f0000000540)=@hci, &(0x7f00000005c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000740)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000002f00)=@xdp, &(0x7f0000002f80)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002fc0), &(0x7f0000003000)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003100)={@empty, @multicast2}, &(0x7f0000003140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003180)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000003280)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000032c0)={{{@in=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f00000033c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003400)={{{@in6, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000003500)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003540)={{{@in=@local, @in6=@local}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000036c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003700)={'ip6gre0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003740)={0x0, @loopback, @rand_addr}, &(0x7f0000000240)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003a40)={{{@in6=@mcast1, @in6=@mcast1}}, {{}, 0x0, @in=@local}}, &(0x7f0000003b40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c00)={{{@in6=@dev, @in=@multicast2}}, {{@in6}, 0x0, @in6}}, &(0x7f0000003d00)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004d80)={0x0, @remote}, &(0x7f0000004dc0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000dc80), 0x0, 0x0, &(0x7f000000dec0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dfc0)={{{@in6, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f000000e0c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000e100)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f000000e200)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000e240)={{{@in=@broadcast, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000e340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000013740)={@mcast2}, &(0x7f0000013780)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000013a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000013a80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000013b80)={{{@in=@broadcast, @in=@remote}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000013c80)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000013cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000013d00)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000013d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000013dc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013e00)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000013f00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013f40)={@remote}, &(0x7f0000013f80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000014280)={{{@in6, @in6=@ipv4={[], [], @local}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000014380)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000143c0)={0x0, @multicast1, @dev}, &(0x7f0000014400)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000014440)={{{@in6, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000014540)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000015200)={&(0x7f0000000180), 0xc, &(0x7f00000151c0)={&(0x7f0000000880)=ANY=[]}}, 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="f8805da01d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df9f3f") 06:48:06 executing program 4: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) memfd_create(&(0x7f0000000600)='/dev/fuse\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000340)=ANY=[], &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) kexec_load(0x0, 0x0, &(0x7f0000000640), 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000001840)={{&(0x7f0000000700)=""/185, 0xb9}, &(0x7f00000007c0)}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) unshare(0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000240)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000380)}) socket$alg(0x26, 0x5, 0x0) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000640)=""/168) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000ac0), &(0x7f0000000b40)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000e80)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000f40)=0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000005a00), &(0x7f0000005b00)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000077c0), &(0x7f0000007800)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000007840), &(0x7f0000007980)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000079c0), &(0x7f0000007a00)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000007a40)={0x0, @in={{0x2, 0x0, @remote}}}, &(0x7f0000007b00)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000008f40)={0x0, 0x0, &(0x7f0000008ec0)}, &(0x7f0000008f80)=0x10) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000009180), 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/185) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 06:48:06 executing program 2: getitimer(0x1, &(0x7f0000000000)) ustat(0x0, &(0x7f0000000280)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000640)={'ip6gre0\x00', @ifru_data=&(0x7f0000000600)="55a7d3de2425f647cea8481bc319f20e48470ba0a9a84621dbf14d0b1a90f383"}) creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000680)={0x2, 0x0, @broadcast}, &(0x7f00000006c0)=0x10) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") syz_extract_tcp_res(&(0x7f00000002c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0xff34, 0x0) 06:48:06 executing program 5: signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000580)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000140), 0x4) timerfd_create(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) socket$inet_dccp(0x2, 0x6, 0x0) sysinfo(&(0x7f0000000b40)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)={@mcast2}, &(0x7f0000000400)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000002f00), 0x0, 0x0, &(0x7f0000003080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003300)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000003400)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003500)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000003600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003640)={{{@in=@rand_addr, @in6}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000003740)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003780)={{{@in=@local, @in=@local}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000003880)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000003c40)={&(0x7f00000002c0), 0xc, &(0x7f0000003c00)={&(0x7f00000038c0)=ANY=[]}}, 0x0) timerfd_create(0x0, 0x0) 06:48:06 executing program 1: alarm(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000006c0)=""/4096, &(0x7f0000000040)=0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) keyctl$set_reqkey_keyring(0xf, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) getresgid(&(0x7f0000000180), &(0x7f00000000c0), &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffff9c, &(0x7f00000001c0)=@can, &(0x7f0000000040)=0x80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000080)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) syz_execute_func(&(0x7f00000004c0)="42805da0124fef410fc7e6dc0f01eefe19fa380f212af3f09b81768cc80000000081b5e5bc2b00000021c421fd51376b2179e9dae9e94175450f2e1ac4817950df44dbe2660fc6a500800000002a") ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f00000000c0)={@my}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 06:48:06 executing program 3: memfd_create(&(0x7f0000000040)='eth0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7}, 0x7) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080), 0xc) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001800)="408055a0496969ef69dc00d9c421a05d2f8a20a4a10fd84167c3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0f0ff90cd9ec1a1a00460dc4210311cef045fe810c0000009f") semget$private(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000a00), 0x0, 0x0, &(0x7f0000000a40)={0x0, 0x1c9c380}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000280)=""/16) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000040), 0x0) clock_gettime(0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380), 0x4) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0xd14b, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) clock_settime(0x0, &(0x7f00000002c0)={0x0, 0x1c9c380}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) stat(&(0x7f00000006c0)='./file1\x00', &(0x7f0000000a80)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@rand_addr, @in6=@loopback}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000700)='cifs.idmap\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240), &(0x7f0000000980), 0x0, 0xfffffffffffffffc) 06:48:07 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x3) close(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@ipv4={[], [], @loopback}}, &(0x7f0000000340)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)={@mcast1}, &(0x7f00000004c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'veth1_to_team\x00'}) accept(0xffffffffffffffff, &(0x7f0000000540)=@hci, &(0x7f00000005c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@dev}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000740)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000840)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000002f00)=@xdp, &(0x7f0000002f80)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002fc0), &(0x7f0000003000)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003100)={@empty, @multicast2}, &(0x7f0000003140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003180)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000003280)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000032c0)={{{@in=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f00000033c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003400)={{{@in6, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000003500)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003540)={{{@in=@local, @in6=@local}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000003640)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000036c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003700)={'ip6gre0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003740)={0x0, @loopback, @rand_addr}, &(0x7f0000000240)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003a40)={{{@in6=@mcast1, @in6=@mcast1}}, {{}, 0x0, @in=@local}}, &(0x7f0000003b40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c00)={{{@in6=@dev, @in=@multicast2}}, {{@in6}, 0x0, @in6}}, &(0x7f0000003d00)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004d80)={0x0, @remote}, &(0x7f0000004dc0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000dc80), 0x0, 0x0, &(0x7f000000dec0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000dfc0)={{{@in6, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f000000e0c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000e100)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f000000e200)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000e240)={{{@in=@broadcast, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f000000e340)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000013740)={@mcast2}, &(0x7f0000013780)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000013a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000013a80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000013b80)={{{@in=@broadcast, @in=@remote}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000013c80)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000013cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000013d00)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000013d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000013dc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013e00)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000013f00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013f40)={@remote}, &(0x7f0000013f80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000014280)={{{@in6, @in6=@ipv4={[], [], @local}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000014380)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000143c0)={0x0, @multicast1, @dev}, &(0x7f0000014400)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000014440)={{{@in6, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000014540)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000015200)={&(0x7f0000000180), 0xc, &(0x7f00000151c0)={&(0x7f0000000880)=ANY=[]}}, 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="f8805da01d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df9f3f") 06:48:07 executing program 1: alarm(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000006c0)=""/4096, &(0x7f0000000040)=0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) keyctl$set_reqkey_keyring(0xf, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) getresgid(&(0x7f0000000180), &(0x7f00000000c0), &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffff9c, &(0x7f00000001c0)=@can, &(0x7f0000000040)=0x80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000080)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) syz_execute_func(&(0x7f00000004c0)="42805da0124fef410fc7e6dc0f01eefe19fa380f212af3f09b81768cc80000000081b5e5bc2b00000021c421fd51376b2179e9dae9e94175450f2e1ac4817950df44dbe2660fc6a500800000002a") ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f00000000c0)={@my}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 06:48:07 executing program 4: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) memfd_create(&(0x7f0000000600)='/dev/fuse\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000340)=ANY=[], &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) kexec_load(0x0, 0x0, &(0x7f0000000640), 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000001840)={{&(0x7f0000000700)=""/185, 0xb9}, &(0x7f00000007c0)}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) unshare(0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000240)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000380)}) socket$alg(0x26, 0x5, 0x0) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000640)=""/168) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000ac0), &(0x7f0000000b40)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000e80)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000f40)=0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000005a00), &(0x7f0000005b00)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000077c0), &(0x7f0000007800)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000007840), &(0x7f0000007980)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000079c0), &(0x7f0000007a00)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000007a40)={0x0, @in={{0x2, 0x0, @remote}}}, &(0x7f0000007b00)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000008f40)={0x0, 0x0, &(0x7f0000008ec0)}, &(0x7f0000008f80)=0x10) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000009180), 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/185) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 06:48:07 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffb) clock_gettime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)=""/44, &(0x7f0000000700)=0x2c) clock_gettime(0x0, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000740)) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000200)={0x0, @rand_addr, 0x0, 0x0, 'dh\x00'}, 0x2c) semtimedop(0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={0x77359400}) syz_execute_func(&(0x7f00000003c0)="428055a0f58e1c8e1cef69dc00d931c841ff0f1875c4c3397c2a060f38311a3d3da35d7fdcffc19086d9f28fc9410feefae5e5660fae3a5d0f2e1a1a0166660fe33df65f8d7131a3b786e29879833000") 06:48:07 executing program 3: memfd_create(&(0x7f0000000040)='eth0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7}, 0x7) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080), 0xc) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001800)="408055a0496969ef69dc00d9c421a05d2f8a20a4a10fd84167c3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0f0ff90cd9ec1a1a00460dc4210311cef045fe810c0000009f") semget$private(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000a00), 0x0, 0x0, &(0x7f0000000a40)={0x0, 0x1c9c380}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000280)=""/16) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000040), 0x0) clock_gettime(0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380), 0x4) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0xd14b, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) clock_settime(0x0, &(0x7f00000002c0)={0x0, 0x1c9c380}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) stat(&(0x7f00000006c0)='./file1\x00', &(0x7f0000000a80)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@rand_addr, @in6=@loopback}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000700)='cifs.idmap\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240), &(0x7f0000000980), 0x0, 0xfffffffffffffffc) 06:48:07 executing program 5: request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) inotify_init1(0x0) prctl$void(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=""/4096, 0x105f}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000340)) getgid() keyctl$chown(0x4, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001540)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@local}}, &(0x7f0000001740)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001780)={@dev, @dev}, &(0x7f00000017c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001800)={'yam0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001840)={@dev}, &(0x7f0000001880)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000018c0)={{{@in6=@remote, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000019c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000001c0)=0x11a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001b00)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b40)={0x0, @multicast1}, &(0x7f0000001b80)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c80)={'bridge_slave_1\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001e40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@dev, @in=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000500)=0xffffff0a) 06:48:08 executing program 4: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) memfd_create(&(0x7f0000000600)='/dev/fuse\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000340)=ANY=[], &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) kexec_load(0x0, 0x0, &(0x7f0000000640), 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000001840)={{&(0x7f0000000700)=""/185, 0xb9}, &(0x7f00000007c0)}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) unshare(0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0), &(0x7f0000000240)=0x4) prctl$seccomp(0x1d, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000380)}) socket$alg(0x26, 0x5, 0x0) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000640)=""/168) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000ac0), &(0x7f0000000b40)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000e00), &(0x7f0000000e40)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000e80)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000f40)=0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000005a00), &(0x7f0000005b00)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000077c0), &(0x7f0000007800)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000007840), &(0x7f0000007980)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000079c0), &(0x7f0000007a00)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000007a40)={0x0, @in={{0x2, 0x0, @remote}}}, &(0x7f0000007b00)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000008f40)={0x0, 0x0, &(0x7f0000008ec0)}, &(0x7f0000008f80)=0x10) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000009180), 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/185) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 06:48:08 executing program 3: memfd_create(&(0x7f0000000040)='eth0\x00', 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7}, 0x7) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080), 0xc) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001800)="408055a0496969ef69dc00d9c421a05d2f8a20a4a10fd84167c3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0f0ff90cd9ec1a1a00460dc4210311cef045fe810c0000009f") semget$private(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000a00), 0x0, 0x0, &(0x7f0000000a40)={0x0, 0x1c9c380}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000280)=""/16) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000040), 0x0) clock_gettime(0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380), 0x4) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0xd14b, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) clock_settime(0x0, &(0x7f00000002c0)={0x0, 0x1c9c380}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) stat(&(0x7f00000006c0)='./file1\x00', &(0x7f0000000a80)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@rand_addr, @in6=@loopback}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000700)='cifs.idmap\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240), &(0x7f0000000980), 0x0, 0xfffffffffffffffc) 06:48:08 executing program 1: alarm(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000006c0)=""/4096, &(0x7f0000000040)=0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) keyctl$set_reqkey_keyring(0xf, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) getresgid(&(0x7f0000000180), &(0x7f00000000c0), &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffff9c, &(0x7f00000001c0)=@can, &(0x7f0000000040)=0x80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000080)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) syz_execute_func(&(0x7f00000004c0)="42805da0124fef410fc7e6dc0f01eefe19fa380f212af3f09b81768cc80000000081b5e5bc2b00000021c421fd51376b2179e9dae9e94175450f2e1ac4817950df44dbe2660fc6a500800000002a") ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f00000000c0)={@my}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 06:48:08 executing program 0: prctl$setmm(0x17, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:08 executing program 5: request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) inotify_init1(0x0) prctl$void(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=""/4096, 0x105f}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000340)) getgid() keyctl$chown(0x4, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001540)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@local}}, &(0x7f0000001740)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001780)={@dev, @dev}, &(0x7f00000017c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001800)={'yam0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001840)={@dev}, &(0x7f0000001880)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000018c0)={{{@in6=@remote, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000019c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000001c0)=0x11a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001b00)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b40)={0x0, @multicast1}, &(0x7f0000001b80)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c80)={'bridge_slave_1\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001e40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@dev, @in=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000500)=0xffffff0a) 06:48:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69af40b440e1b9950810bf2c93fd2a26d9e181780aca84f48d19ac75543d591a12c8ea6136d0e14648eedd747c1d27bef0e09f9f54274d9ec66167e0b07656032855958e42d9ba1afadf2edbbafdba24fa53c5591673615b00e2293e6881ff5569e3570dd8136f03433740994d692c54a7524aa79d192afef2467c1f0d02784373ec13ddb490de8d77e553e832098ac9531d451b6447d45838769484bdf") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x800000000004, 0x20011, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8910, &(0x7f0000000140)) 06:48:08 executing program 1: alarm(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000006c0)=""/4096, &(0x7f0000000040)=0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) keyctl$set_reqkey_keyring(0xf, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) getresgid(&(0x7f0000000180), &(0x7f00000000c0), &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffff9c, &(0x7f00000001c0)=@can, &(0x7f0000000040)=0x80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000080)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) syz_execute_func(&(0x7f00000004c0)="42805da0124fef410fc7e6dc0f01eefe19fa380f212af3f09b81768cc80000000081b5e5bc2b00000021c421fd51376b2179e9dae9e94175450f2e1ac4817950df44dbe2660fc6a500800000002a") ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f00000000c0)={@my}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 06:48:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69af40b440e1b9950810bf2c93fd2a26d9e181780aca84f48d19ac75543d591a12c8ea6136d0e14648eedd747c1d27bef0e09f9f54274d9ec66167e0b07656032855958e42d9ba1afadf2edbbafdba24fa53c5591673615b00e2293e6881ff5569e3570dd8136f03433740994d692c54a7524aa79d192afef2467c1f0d02784373ec13ddb490de8d77e553e832098ac9531d451b6447d45838769484bdf") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x800000000004, 0x20011, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8910, &(0x7f0000000140)) 06:48:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69af40b440e1b9950810bf2c93fd2a26d9e181780aca84f48d19ac75543d591a12c8ea6136d0e14648eedd747c1d27bef0e09f9f54274d9ec66167e0b07656032855958e42d9ba1afadf2edbbafdba24fa53c5591673615b00e2293e6881ff5569e3570dd8136f03433740994d692c54a7524aa79d192afef2467c1f0d02784373ec13ddb490de8d77e553e832098ac9531d451b6447d45838769484bdf") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x800000000004, 0x20011, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8910, &(0x7f0000000140)) 06:48:09 executing program 1: getrandom(&(0x7f0000000340)=""/104, 0x130, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f00000001c0)) recvfrom(0xffffffffffffffff, &(0x7f00000004c0)=""/108, 0x6c, 0x0, &(0x7f0000000780)=@nfc, 0x80) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000b00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in=@remote, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@loopback, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000dc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f80)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000001080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f80)={{{@in=@dev, @in6=@loopback}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000002080)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002180)=0x14) getsockname(0xffffffffffffffff, &(0x7f00000021c0)=@xdp, &(0x7f0000002240)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@broadcast, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002380)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000023c0)={{{@in6, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000024c0)=0xe8) accept(0xffffffffffffffff, &(0x7f0000005980)=@hci, &(0x7f0000005a00)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005b00)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@remote}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@dev}}, &(0x7f0000005c00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005c40)={{{@in=@multicast2, @in6=@remote}}, {{@in6}, 0x0, @in6}}, &(0x7f0000005d40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d80)={@mcast1}, &(0x7f0000005dc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005e00)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000005f00)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000e00)=@xdp, &(0x7f0000005fc0)=0xfffffffffffffdf1) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000060c0)={@loopback}, &(0x7f0000006100)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000006180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000061c0)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000006200)=@hci, &(0x7f0000006280)=0x80) accept(0xffffffffffffffff, &(0x7f00000062c0)=@xdp, &(0x7f0000006340)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000006580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000065c0)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006680)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000066c0)={{{@in6=@dev, @in=@multicast2}}, {{@in=@local}, 0x0, @in6}}, &(0x7f00000067c0)=0xe8) recvmmsg(0xffffffffffffff9c, &(0x7f0000009800), 0x0, 0x0, &(0x7f0000009980)={0x0, 0x1c9c380}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000099c0)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000009ac0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009b40)={{{@in=@local, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000009c40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b0c0)={{{@in6=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000b1c0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bc00)={&(0x7f0000000580), 0xc, &(0x7f000000bbc0)={&(0x7f000000b200)={0x14}, 0x14}}, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getresgid(&(0x7f0000000280), &(0x7f0000000100), &(0x7f0000000180)) getegid() getpid() fcntl$notify(0xffffffffffffffff, 0x402, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000240)=@buf={0x0, &(0x7f0000000480)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) syz_execute_func(&(0x7f00000002c0)="42805da06a0f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 06:48:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69af40b440e1b9950810bf2c93fd2a26d9e181780aca84f48d19ac75543d591a12c8ea6136d0e14648eedd747c1d27bef0e09f9f54274d9ec66167e0b07656032855958e42d9ba1afadf2edbbafdba24fa53c5591673615b00e2293e6881ff5569e3570dd8136f03433740994d692c54a7524aa79d192afef2467c1f0d02784373ec13ddb490de8d77e553e832098ac9531d451b6447d45838769484bdf") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x800000000004, 0x20011, r0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8910, &(0x7f0000000140)) 06:48:09 executing program 4: unshare(0x20000000) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) wait4(0x0, 0x0, 0x40000000, &(0x7f0000781f70)) 06:48:09 executing program 3: openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x181400, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) clock_gettime(0x0, &(0x7f0000000380)) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000340), 0x10, &(0x7f00000005c0)={&(0x7f0000000540)={0x0, 0x0, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9b69f873d380e40926e6f02f8d8d955545dcd2fb68793cdf64f7b47363f927bf1263deb61fbef1c235ec1684406328b6675b5bc83eac8602be905876b9f42e44"}}, 0x80}}, 0x0) epoll_create(0x0) socket$nl_generic(0x10, 0x3, 0x10) futex(&(0x7f0000000180), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000080), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 06:48:09 executing program 0: prctl$setmm(0x17, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:09 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='vboxnet0-\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000500)=0x6e) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000180)={'ip6tnl0\x00', {0x2, 0x0, @remote}}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000ff5000/0xb000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) geteuid() fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000200)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") sched_getaffinity(0x0, 0x8, &(0x7f00000001c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000640)="428055a027c4e1ce582d0000000000d96736e60641ff0f1837370f38211ac4c1be8466d9f28fc9c91941202bc46178131717e50f2e1ac4010d64ac1e5d31a3b70ac6cef6cef62dd541029f") 06:48:09 executing program 5: request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) inotify_init1(0x0) prctl$void(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=""/4096, 0x105f}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000340)) getgid() keyctl$chown(0x4, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001540)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@local}}, &(0x7f0000001740)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001780)={@dev, @dev}, &(0x7f00000017c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001800)={'yam0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001840)={@dev}, &(0x7f0000001880)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000018c0)={{{@in6=@remote, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000019c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000001c0)=0x11a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001b00)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b40)={0x0, @multicast1}, &(0x7f0000001b80)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c80)={'bridge_slave_1\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001e40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@dev, @in=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000500)=0xffffff0a) 06:48:09 executing program 4: unshare(0x20000000) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) wait4(0x0, 0x0, 0x40000000, &(0x7f0000781f70)) 06:48:09 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='vboxnet0-\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000500)=0x6e) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000180)={'ip6tnl0\x00', {0x2, 0x0, @remote}}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000ff5000/0xb000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) geteuid() fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000200)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") sched_getaffinity(0x0, 0x8, &(0x7f00000001c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000640)="428055a027c4e1ce582d0000000000d96736e60641ff0f1837370f38211ac4c1be8466d9f28fc9c91941202bc46178131717e50f2e1ac4010d64ac1e5d31a3b70ac6cef6cef62dd541029f") 06:48:09 executing program 4: unshare(0x20000000) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) wait4(0x0, 0x0, 0x40000000, &(0x7f0000781f70)) 06:48:10 executing program 4: unshare(0x20000000) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) wait4(0x0, 0x0, 0x40000000, &(0x7f0000781f70)) 06:48:10 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='vboxnet0-\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000500)=0x6e) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000180)={'ip6tnl0\x00', {0x2, 0x0, @remote}}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000ff5000/0xb000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) geteuid() fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000200)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") sched_getaffinity(0x0, 0x8, &(0x7f00000001c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000640)="428055a027c4e1ce582d0000000000d96736e60641ff0f1837370f38211ac4c1be8466d9f28fc9c91941202bc46178131717e50f2e1ac4010d64ac1e5d31a3b70ac6cef6cef62dd541029f") 06:48:10 executing program 1: getrandom(&(0x7f0000000340)=""/104, 0x130, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f00000001c0)) recvfrom(0xffffffffffffffff, &(0x7f00000004c0)=""/108, 0x6c, 0x0, &(0x7f0000000780)=@nfc, 0x80) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000b00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in=@remote, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@loopback, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000dc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f80)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000001080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f80)={{{@in=@dev, @in6=@loopback}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000002080)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002180)=0x14) getsockname(0xffffffffffffffff, &(0x7f00000021c0)=@xdp, &(0x7f0000002240)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@broadcast, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002380)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000023c0)={{{@in6, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000024c0)=0xe8) accept(0xffffffffffffffff, &(0x7f0000005980)=@hci, &(0x7f0000005a00)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005b00)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@remote}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@dev}}, &(0x7f0000005c00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005c40)={{{@in=@multicast2, @in6=@remote}}, {{@in6}, 0x0, @in6}}, &(0x7f0000005d40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d80)={@mcast1}, &(0x7f0000005dc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005e00)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000005f00)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000e00)=@xdp, &(0x7f0000005fc0)=0xfffffffffffffdf1) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000060c0)={@loopback}, &(0x7f0000006100)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000006180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000061c0)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000006200)=@hci, &(0x7f0000006280)=0x80) accept(0xffffffffffffffff, &(0x7f00000062c0)=@xdp, &(0x7f0000006340)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000006580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000065c0)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006680)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000066c0)={{{@in6=@dev, @in=@multicast2}}, {{@in=@local}, 0x0, @in6}}, &(0x7f00000067c0)=0xe8) recvmmsg(0xffffffffffffff9c, &(0x7f0000009800), 0x0, 0x0, &(0x7f0000009980)={0x0, 0x1c9c380}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000099c0)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000009ac0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009b40)={{{@in=@local, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000009c40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b0c0)={{{@in6=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000b1c0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bc00)={&(0x7f0000000580), 0xc, &(0x7f000000bbc0)={&(0x7f000000b200)={0x14}, 0x14}}, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getresgid(&(0x7f0000000280), &(0x7f0000000100), &(0x7f0000000180)) getegid() getpid() fcntl$notify(0xffffffffffffffff, 0x402, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000240)=@buf={0x0, &(0x7f0000000480)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) syz_execute_func(&(0x7f00000002c0)="42805da06a0f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 06:48:10 executing program 0: prctl$setmm(0x17, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:10 executing program 3: openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x181400, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) clock_gettime(0x0, &(0x7f0000000380)) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000340), 0x10, &(0x7f00000005c0)={&(0x7f0000000540)={0x0, 0x0, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9b69f873d380e40926e6f02f8d8d955545dcd2fb68793cdf64f7b47363f927bf1263deb61fbef1c235ec1684406328b6675b5bc83eac8602be905876b9f42e44"}}, 0x80}}, 0x0) epoll_create(0x0) socket$nl_generic(0x10, 0x3, 0x10) futex(&(0x7f0000000180), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000080), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 06:48:10 executing program 4: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001dc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001f00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f40)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000002040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002080)={@multicast2, @dev}, &(0x7f00000020c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002140)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002300), &(0x7f0000002340)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002440)={0x0, @remote, @local}, &(0x7f0000002480)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000480), 0xc, &(0x7f00000028c0)={&(0x7f00000024c0)={0x14}, 0x14}}, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 06:48:10 executing program 5: request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) inotify_init1(0x0) prctl$void(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=""/4096, 0x105f}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000340)) getgid() keyctl$chown(0x4, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001540)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in=@dev, @in6=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@local}}, &(0x7f0000001740)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001780)={@dev, @dev}, &(0x7f00000017c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001800)={'yam0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001840)={@dev}, &(0x7f0000001880)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000018c0)={{{@in6=@remote, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000019c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000001c0)=0x11a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001b00)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001b40)={0x0, @multicast1}, &(0x7f0000001b80)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c80)={'bridge_slave_1\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001e40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in6=@dev, @in=@remote}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000500)=0xffffff0a) 06:48:10 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='vboxnet0-\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='clear_refs\x00') getpeername$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000500)=0x6e) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000180)={'ip6tnl0\x00', {0x2, 0x0, @remote}}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) shmat(0x0, &(0x7f0000ff5000/0xb000)=nil, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) geteuid() fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000200)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") sched_getaffinity(0x0, 0x8, &(0x7f00000001c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000640)="428055a027c4e1ce582d0000000000d96736e60641ff0f1837370f38211ac4c1be8466d9f28fc9c91941202bc46178131717e50f2e1ac4010d64ac1e5d31a3b70ac6cef6cef62dd541029f") 06:48:11 executing program 3: openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x181400, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) clock_gettime(0x0, &(0x7f0000000380)) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000340), 0x10, &(0x7f00000005c0)={&(0x7f0000000540)={0x0, 0x0, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9b69f873d380e40926e6f02f8d8d955545dcd2fb68793cdf64f7b47363f927bf1263deb61fbef1c235ec1684406328b6675b5bc83eac8602be905876b9f42e44"}}, 0x80}}, 0x0) epoll_create(0x0) socket$nl_generic(0x10, 0x3, 0x10) futex(&(0x7f0000000180), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000080), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 06:48:11 executing program 0: prctl$setmm(0x17, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:11 executing program 1: getrandom(&(0x7f0000000340)=""/104, 0x130, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f00000001c0)) recvfrom(0xffffffffffffffff, &(0x7f00000004c0)=""/108, 0x6c, 0x0, &(0x7f0000000780)=@nfc, 0x80) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000b00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in=@remote, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@loopback, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000dc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f80)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000001080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f80)={{{@in=@dev, @in6=@loopback}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000002080)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002180)=0x14) getsockname(0xffffffffffffffff, &(0x7f00000021c0)=@xdp, &(0x7f0000002240)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@broadcast, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002380)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000023c0)={{{@in6, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000024c0)=0xe8) accept(0xffffffffffffffff, &(0x7f0000005980)=@hci, &(0x7f0000005a00)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005b00)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@remote}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@dev}}, &(0x7f0000005c00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005c40)={{{@in=@multicast2, @in6=@remote}}, {{@in6}, 0x0, @in6}}, &(0x7f0000005d40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d80)={@mcast1}, &(0x7f0000005dc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005e00)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000005f00)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000e00)=@xdp, &(0x7f0000005fc0)=0xfffffffffffffdf1) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000060c0)={@loopback}, &(0x7f0000006100)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000006180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000061c0)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000006200)=@hci, &(0x7f0000006280)=0x80) accept(0xffffffffffffffff, &(0x7f00000062c0)=@xdp, &(0x7f0000006340)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000006580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000065c0)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006680)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000066c0)={{{@in6=@dev, @in=@multicast2}}, {{@in=@local}, 0x0, @in6}}, &(0x7f00000067c0)=0xe8) recvmmsg(0xffffffffffffff9c, &(0x7f0000009800), 0x0, 0x0, &(0x7f0000009980)={0x0, 0x1c9c380}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000099c0)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000009ac0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009b40)={{{@in=@local, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000009c40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b0c0)={{{@in6=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000b1c0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bc00)={&(0x7f0000000580), 0xc, &(0x7f000000bbc0)={&(0x7f000000b200)={0x14}, 0x14}}, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getresgid(&(0x7f0000000280), &(0x7f0000000100), &(0x7f0000000180)) getegid() getpid() fcntl$notify(0xffffffffffffffff, 0x402, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000240)=@buf={0x0, &(0x7f0000000480)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) syz_execute_func(&(0x7f00000002c0)="42805da06a0f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 06:48:11 executing program 4: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001dc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001f00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f40)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000002040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002080)={@multicast2, @dev}, &(0x7f00000020c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002140)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002300), &(0x7f0000002340)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002440)={0x0, @remote, @local}, &(0x7f0000002480)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000480), 0xc, &(0x7f00000028c0)={&(0x7f00000024c0)={0x14}, 0x14}}, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 06:48:11 executing program 2: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000040)=""/4, 0x4}, 0x120) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@ipv4}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, &(0x7f00000000c0), &(0x7f0000000140)=0x4) syz_execute_func(&(0x7f0000000480)="428055a05e6969ef69dc00d9e3af0fe1ff6920375137c339b52a8e0f38c4c37c6d9ea80000004edba564a70f97f20f2bac090d000000bb00000040428fb07e6767e5417545800f2e8f0850cc293201460f01ee420f820e000000262e6426f30f2b050974020027") ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 06:48:11 executing program 5: getrusage(0x0, &(0x7f0000000940)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000001d40)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) openat$zero(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000b80)=""/4096) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000580)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000600)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000880)={0x7}, 0x7) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000800)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x2d1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c00)={'bcsh0\x00'}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001c40)={@empty, @local, @remote}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000001bc0)) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000240)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000040)) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000380)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) fstat(0xffffffffffffffff, &(0x7f0000000500)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000001b80)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000900)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000008c0), 0xc, &(0x7f0000000a40)={&(0x7f0000001d80)=ANY=[]}}, 0x0) 06:48:12 executing program 3: openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x181400, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) clock_gettime(0x0, &(0x7f0000000380)) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000340), 0x10, &(0x7f00000005c0)={&(0x7f0000000540)={0x0, 0x0, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9b69f873d380e40926e6f02f8d8d955545dcd2fb68793cdf64f7b47363f927bf1263deb61fbef1c235ec1684406328b6675b5bc83eac8602be905876b9f42e44"}}, 0x80}}, 0x0) epoll_create(0x0) socket$nl_generic(0x10, 0x3, 0x10) futex(&(0x7f0000000180), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000080), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 06:48:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00'}) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000300), 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0x930}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 06:48:12 executing program 1: getrandom(&(0x7f0000000340)=""/104, 0x130, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f00000001c0)) recvfrom(0xffffffffffffffff, &(0x7f00000004c0)=""/108, 0x6c, 0x0, &(0x7f0000000780)=@nfc, 0x80) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000b00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in=@remote, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@loopback, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000dc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f80)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000001080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f80)={{{@in=@dev, @in6=@loopback}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000002080)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002180)=0x14) getsockname(0xffffffffffffffff, &(0x7f00000021c0)=@xdp, &(0x7f0000002240)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@broadcast, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002380)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000023c0)={{{@in6, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000024c0)=0xe8) accept(0xffffffffffffffff, &(0x7f0000005980)=@hci, &(0x7f0000005a00)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005b00)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@remote}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@dev}}, &(0x7f0000005c00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005c40)={{{@in=@multicast2, @in6=@remote}}, {{@in6}, 0x0, @in6}}, &(0x7f0000005d40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d80)={@mcast1}, &(0x7f0000005dc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005e00)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000005f00)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000e00)=@xdp, &(0x7f0000005fc0)=0xfffffffffffffdf1) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000060c0)={@loopback}, &(0x7f0000006100)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000006180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000061c0)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000006200)=@hci, &(0x7f0000006280)=0x80) accept(0xffffffffffffffff, &(0x7f00000062c0)=@xdp, &(0x7f0000006340)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000006580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000065c0)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000006600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006680)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000066c0)={{{@in6=@dev, @in=@multicast2}}, {{@in=@local}, 0x0, @in6}}, &(0x7f00000067c0)=0xe8) recvmmsg(0xffffffffffffff9c, &(0x7f0000009800), 0x0, 0x0, &(0x7f0000009980)={0x0, 0x1c9c380}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000099c0)={{{@in=@local, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000009ac0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009b40)={{{@in=@local, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000009c40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b0c0)={{{@in6=@remote, @in6}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000b1c0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000bc00)={&(0x7f0000000580), 0xc, &(0x7f000000bbc0)={&(0x7f000000b200)={0x14}, 0x14}}, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getresgid(&(0x7f0000000280), &(0x7f0000000100), &(0x7f0000000180)) getegid() getpid() fcntl$notify(0xffffffffffffffff, 0x402, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000240)=@buf={0x0, &(0x7f0000000480)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) syz_execute_func(&(0x7f00000002c0)="42805da06a0f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 06:48:12 executing program 4: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001dc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001f00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f40)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000002040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002080)={@multicast2, @dev}, &(0x7f00000020c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002140)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002300), &(0x7f0000002340)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002440)={0x0, @remote, @local}, &(0x7f0000002480)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000480), 0xc, &(0x7f00000028c0)={&(0x7f00000024c0)={0x14}, 0x14}}, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 06:48:12 executing program 2: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000040)=""/4, 0x4}, 0x120) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@ipv4}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, &(0x7f00000000c0), &(0x7f0000000140)=0x4) syz_execute_func(&(0x7f0000000480)="428055a05e6969ef69dc00d9e3af0fe1ff6920375137c339b52a8e0f38c4c37c6d9ea80000004edba564a70f97f20f2bac090d000000bb00000040428fb07e6767e5417545800f2e8f0850cc293201460f01ee420f820e000000262e6426f30f2b050974020027") ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 06:48:12 executing program 5: getrusage(0x0, &(0x7f0000000940)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000001d40)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) openat$zero(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000b80)=""/4096) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000580)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000600)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000880)={0x7}, 0x7) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000800)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x2d1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c00)={'bcsh0\x00'}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001c40)={@empty, @local, @remote}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000001bc0)) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000240)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000040)) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000380)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) fstat(0xffffffffffffffff, &(0x7f0000000500)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000001b80)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000900)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000008c0), 0xc, &(0x7f0000000a40)={&(0x7f0000001d80)=ANY=[]}}, 0x0) 06:48:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00'}) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000300), 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0x930}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 06:48:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00'}) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000300), 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0x930}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 06:48:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00'}) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000300), 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0x930}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 06:48:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00'}) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000300), 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0x930}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 06:48:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00'}) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000300), 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0x930}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 06:48:13 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x171, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) io_setup(0x0, 0xfffffffffffffffe) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000007c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) getpgrp(0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c40), &(0x7f0000004c80)=0xc) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004fc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005000)={{{@in, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000005100)=0xe8) stat(&(0x7f0000005140)='./file1\x00', &(0x7f0000005180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005ac0), &(0x7f0000005b00)=0xc) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005b40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005b80)={{{@in6=@local, @in=@broadcast}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000005c80)=0xe8) lstat(&(0x7f0000005cc0)='./file0\x00', &(0x7f0000005d00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000008800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 06:48:13 executing program 4: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001dc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001f00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f40)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000002040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002080)={@multicast2, @dev}, &(0x7f00000020c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002140)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002300), &(0x7f0000002340)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002440)={0x0, @remote, @local}, &(0x7f0000002480)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000480), 0xc, &(0x7f00000028c0)={&(0x7f00000024c0)={0x14}, 0x14}}, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 06:48:13 executing program 2: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000040)=""/4, 0x4}, 0x120) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@ipv4}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, &(0x7f00000000c0), &(0x7f0000000140)=0x4) syz_execute_func(&(0x7f0000000480)="428055a05e6969ef69dc00d9e3af0fe1ff6920375137c339b52a8e0f38c4c37c6d9ea80000004edba564a70f97f20f2bac090d000000bb00000040428fb07e6767e5417545800f2e8f0850cc293201460f01ee420f820e000000262e6426f30f2b050974020027") ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 06:48:13 executing program 5: getrusage(0x0, &(0x7f0000000940)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000001d40)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) openat$zero(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000b80)=""/4096) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000580)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000600)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000880)={0x7}, 0x7) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000800)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x2d1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c00)={'bcsh0\x00'}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001c40)={@empty, @local, @remote}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000001bc0)) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000240)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000040)) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000380)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) fstat(0xffffffffffffffff, &(0x7f0000000500)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000001b80)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000900)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000008c0), 0xc, &(0x7f0000000a40)={&(0x7f0000001d80)=ANY=[]}}, 0x0) 06:48:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00'}) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000300), 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0x930}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 06:48:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00'}) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000300), 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0x930}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 06:48:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00'}) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000300), 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0x930}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 06:48:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00'}) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000300), 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0x930}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 06:48:14 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=""/23, 0x17}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001980)={'NETMAP\x00'}, &(0x7f00000019c0)=0x1e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) futex(&(0x7f0000000380), 0x5, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f00000005c0), 0x0) openat(0xffffffffffffffff, &(0x7f00000018c0)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0x0) add_key(&(0x7f0000000580)='user\x00', &(0x7f0000000440), 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x6, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000640)) add_key(&(0x7f0000000500)='big_key\x00', &(0x7f0000000540), &(0x7f0000000600), 0x0, 0xfffffffffffffff9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) getgroups(0x0, &(0x7f0000000a40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000b80)=0xe8) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in6, @in=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000cc0)=0xe8) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 06:48:14 executing program 4: clock_gettime(0x6, &(0x7f00000006c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 06:48:14 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x171, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) io_setup(0x0, 0xfffffffffffffffe) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000007c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) getpgrp(0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c40), &(0x7f0000004c80)=0xc) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004fc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005000)={{{@in, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000005100)=0xe8) stat(&(0x7f0000005140)='./file1\x00', &(0x7f0000005180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005ac0), &(0x7f0000005b00)=0xc) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005b40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005b80)={{{@in6=@local, @in=@broadcast}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000005c80)=0xe8) lstat(&(0x7f0000005cc0)='./file0\x00', &(0x7f0000005d00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000008800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 06:48:14 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000004c0)=ANY=[], &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0c6660f54fe9038e379392a8e0f38211a64a741fff040d9fbe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b0509000000bd3f") 06:48:14 executing program 2: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000040)=""/4, 0x4}, 0x120) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@ipv4}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, &(0x7f00000000c0), &(0x7f0000000140)=0x4) syz_execute_func(&(0x7f0000000480)="428055a05e6969ef69dc00d9e3af0fe1ff6920375137c339b52a8e0f38c4c37c6d9ea80000004edba564a70f97f20f2bac090d000000bb00000040428fb07e6767e5417545800f2e8f0850cc293201460f01ee420f820e000000262e6426f30f2b050974020027") ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) 06:48:14 executing program 5: getrusage(0x0, &(0x7f0000000940)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000001d40)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) openat$zero(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000b80)=""/4096) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000580)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000600)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000880)={0x7}, 0x7) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000800)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x2d1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c00)={'bcsh0\x00'}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001c40)={@empty, @local, @remote}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000001bc0)) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000240)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000040)) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000380)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) fstat(0xffffffffffffffff, &(0x7f0000000500)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000001b80)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000900)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000008c0), 0xc, &(0x7f0000000a40)={&(0x7f0000001d80)=ANY=[]}}, 0x0) 06:48:14 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=""/23, 0x17}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001980)={'NETMAP\x00'}, &(0x7f00000019c0)=0x1e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) futex(&(0x7f0000000380), 0x5, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f00000005c0), 0x0) openat(0xffffffffffffffff, &(0x7f00000018c0)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0x0) add_key(&(0x7f0000000580)='user\x00', &(0x7f0000000440), 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x6, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000640)) add_key(&(0x7f0000000500)='big_key\x00', &(0x7f0000000540), &(0x7f0000000600), 0x0, 0xfffffffffffffff9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) getgroups(0x0, &(0x7f0000000a40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000b80)=0xe8) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in6, @in=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000cc0)=0xe8) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 06:48:15 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x171, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) io_setup(0x0, 0xfffffffffffffffe) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000007c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) getpgrp(0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c40), &(0x7f0000004c80)=0xc) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004fc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005000)={{{@in, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000005100)=0xe8) stat(&(0x7f0000005140)='./file1\x00', &(0x7f0000005180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005ac0), &(0x7f0000005b00)=0xc) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005b40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005b80)={{{@in6=@local, @in=@broadcast}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000005c80)=0xe8) lstat(&(0x7f0000005cc0)='./file0\x00', &(0x7f0000005d00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000008800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 06:48:15 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000004c0)=ANY=[], &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0c6660f54fe9038e379392a8e0f38211a64a741fff040d9fbe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b0509000000bd3f") 06:48:15 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x100000) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:48:15 executing program 5: prctl$intptr(0x400000000004, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000440)=""/177) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 06:48:15 executing program 4: clock_gettime(0x6, &(0x7f00000006c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 06:48:15 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x100000) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:48:15 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x100000) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:48:15 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x100000) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:48:15 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=""/23, 0x17}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001980)={'NETMAP\x00'}, &(0x7f00000019c0)=0x1e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) futex(&(0x7f0000000380), 0x5, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f00000005c0), 0x0) openat(0xffffffffffffffff, &(0x7f00000018c0)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0x0) add_key(&(0x7f0000000580)='user\x00', &(0x7f0000000440), 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x6, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000640)) add_key(&(0x7f0000000500)='big_key\x00', &(0x7f0000000540), &(0x7f0000000600), 0x0, 0xfffffffffffffff9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) getgroups(0x0, &(0x7f0000000a40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000b80)=0xe8) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in6, @in=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000cc0)=0xe8) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 06:48:16 executing program 2: clock_gettime(0x7, &(0x7f0000000380)) clock_settime(0x0, &(0x7f00000001c0)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000440)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@ipv4={[], [], @loopback}}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a580)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f000000a680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a6c0)={{{@in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f000000a7c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a800)={{{@in6=@local, @in6=@ipv4={[], [], @local}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f000000a900)=0xe8) accept(0xffffffffffffffff, &(0x7f000000a940)=@xdp, &(0x7f0000000680)=0x37) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aa00)={@rand_addr, @broadcast}, &(0x7f000000aa40)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000bb00), 0x0, 0x0, &(0x7f000000bc00)={0x0, 0x989680}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000bc40)={{{@in6=@mcast1, @in6=@ipv4}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f000000bd40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000bec0)={0x0, @empty, @dev}, &(0x7f000000bf00)=0xfffffffffffffeb7) getpeername$packet(0xffffffffffffffff, &(0x7f000000bf40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000bfc0)={{{@in=@local}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f000000c0c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000240), &(0x7f000000c140)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c200)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000c240), &(0x7f000000c280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000c400)={{{@in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f000000c500)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0766969ef69dc00d99066410f55a4e088d557207c2a06c46129ef950000002140a564a70f157a9e400f01efe5e5417545c4e37d6d5200002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f7e") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) 06:48:16 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000004c0)=ANY=[], &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0c6660f54fe9038e379392a8e0f38211a64a741fff040d9fbe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b0509000000bd3f") 06:48:16 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x171, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) io_setup(0x0, 0xfffffffffffffffe) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000007c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) getpgrp(0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c40), &(0x7f0000004c80)=0xc) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004fc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005000)={{{@in, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000005100)=0xe8) stat(&(0x7f0000005140)='./file1\x00', &(0x7f0000005180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005ac0), &(0x7f0000005b00)=0xc) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005b40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005b80)={{{@in6=@local, @in=@broadcast}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000005c80)=0xe8) lstat(&(0x7f0000005cc0)='./file0\x00', &(0x7f0000005d00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000008800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 06:48:16 executing program 4: clock_gettime(0x6, &(0x7f00000006c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 06:48:16 executing program 5: prctl$intptr(0x400000000004, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000440)=""/177) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 06:48:16 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=""/23, 0x17}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001980)={'NETMAP\x00'}, &(0x7f00000019c0)=0x1e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) futex(&(0x7f0000000380), 0x5, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f00000005c0), 0x0) openat(0xffffffffffffffff, &(0x7f00000018c0)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0x0) add_key(&(0x7f0000000580)='user\x00', &(0x7f0000000440), 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x6, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000640)) add_key(&(0x7f0000000500)='big_key\x00', &(0x7f0000000540), &(0x7f0000000600), 0x0, 0xfffffffffffffff9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) getgroups(0x0, &(0x7f0000000a40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000b80)=0xe8) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in6, @in=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000cc0)=0xe8) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 06:48:16 executing program 2: clock_gettime(0x7, &(0x7f0000000380)) clock_settime(0x0, &(0x7f00000001c0)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000440)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@ipv4={[], [], @loopback}}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a580)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f000000a680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a6c0)={{{@in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f000000a7c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a800)={{{@in6=@local, @in6=@ipv4={[], [], @local}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f000000a900)=0xe8) accept(0xffffffffffffffff, &(0x7f000000a940)=@xdp, &(0x7f0000000680)=0x37) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aa00)={@rand_addr, @broadcast}, &(0x7f000000aa40)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000bb00), 0x0, 0x0, &(0x7f000000bc00)={0x0, 0x989680}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000bc40)={{{@in6=@mcast1, @in6=@ipv4}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f000000bd40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000bec0)={0x0, @empty, @dev}, &(0x7f000000bf00)=0xfffffffffffffeb7) getpeername$packet(0xffffffffffffffff, &(0x7f000000bf40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000bfc0)={{{@in=@local}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f000000c0c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000240), &(0x7f000000c140)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c200)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000c240), &(0x7f000000c280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000c400)={{{@in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f000000c500)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0766969ef69dc00d99066410f55a4e088d557207c2a06c46129ef950000002140a564a70f157a9e400f01efe5e5417545c4e37d6d5200002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f7e") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) 06:48:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba694214aefdec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000098add1375f51e135848fea98c6e3574511e0c61ff22ff61f0000000000", 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)="637075616382742e75736167655f73797300564f2b1913679cfabc7112d19b94e7bde51d2559f5e7a110d690702a3fd6293129d5dccc7d1deaf1cdbf834342a60b951351575013aba1e6fb7c82521e9ad2238d8206ed35d69a7ff8a16381c72ed23295cbab23cb3ab9b400df5788428ce2df3f74a51b54bc254764747e31244ab11a78e9331c9a18ad6116f1d3ed5861fd4be88371f9e82fe04798908bb6ac5c7f12ada64018e346199da67ba6ddcdb06a423094623f048c7f26fa6125", 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000080)=""/77) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000100)=""/79) socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 06:48:17 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000004c0)=ANY=[], &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0c6660f54fe9038e379392a8e0f38211a64a741fff040d9fbe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b0509000000bd3f") 06:48:17 executing program 4: clock_gettime(0x6, &(0x7f00000006c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 06:48:17 executing program 5: prctl$intptr(0x400000000004, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000440)=""/177) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 212.754123] syz-executor1 (7549) used greatest stack depth: 14688 bytes left 06:48:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba694214aefdec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000098add1375f51e135848fea98c6e3574511e0c61ff22ff61f0000000000", 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)="637075616382742e75736167655f73797300564f2b1913679cfabc7112d19b94e7bde51d2559f5e7a110d690702a3fd6293129d5dccc7d1deaf1cdbf834342a60b951351575013aba1e6fb7c82521e9ad2238d8206ed35d69a7ff8a16381c72ed23295cbab23cb3ab9b400df5788428ce2df3f74a51b54bc254764747e31244ab11a78e9331c9a18ad6116f1d3ed5861fd4be88371f9e82fe04798908bb6ac5c7f12ada64018e346199da67ba6ddcdb06a423094623f048c7f26fa6125", 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000080)=""/77) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000100)=""/79) socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 06:48:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba694214aefdec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000098add1375f51e135848fea98c6e3574511e0c61ff22ff61f0000000000", 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)="637075616382742e75736167655f73797300564f2b1913679cfabc7112d19b94e7bde51d2559f5e7a110d690702a3fd6293129d5dccc7d1deaf1cdbf834342a60b951351575013aba1e6fb7c82521e9ad2238d8206ed35d69a7ff8a16381c72ed23295cbab23cb3ab9b400df5788428ce2df3f74a51b54bc254764747e31244ab11a78e9331c9a18ad6116f1d3ed5861fd4be88371f9e82fe04798908bb6ac5c7f12ada64018e346199da67ba6ddcdb06a423094623f048c7f26fa6125", 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000080)=""/77) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000100)=""/79) socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 06:48:17 executing program 2: clock_gettime(0x7, &(0x7f0000000380)) clock_settime(0x0, &(0x7f00000001c0)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000440)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@ipv4={[], [], @loopback}}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a580)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f000000a680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a6c0)={{{@in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f000000a7c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a800)={{{@in6=@local, @in6=@ipv4={[], [], @local}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f000000a900)=0xe8) accept(0xffffffffffffffff, &(0x7f000000a940)=@xdp, &(0x7f0000000680)=0x37) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aa00)={@rand_addr, @broadcast}, &(0x7f000000aa40)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000bb00), 0x0, 0x0, &(0x7f000000bc00)={0x0, 0x989680}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000bc40)={{{@in6=@mcast1, @in6=@ipv4}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f000000bd40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000bec0)={0x0, @empty, @dev}, &(0x7f000000bf00)=0xfffffffffffffeb7) getpeername$packet(0xffffffffffffffff, &(0x7f000000bf40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000bfc0)={{{@in=@local}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f000000c0c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000240), &(0x7f000000c140)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c200)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000c240), &(0x7f000000c280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000c400)={{{@in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f000000c500)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0766969ef69dc00d99066410f55a4e088d557207c2a06c46129ef950000002140a564a70f157a9e400f01efe5e5417545c4e37d6d5200002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f7e") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) 06:48:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba694214aefdec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000098add1375f51e135848fea98c6e3574511e0c61ff22ff61f0000000000", 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)="637075616382742e75736167655f73797300564f2b1913679cfabc7112d19b94e7bde51d2559f5e7a110d690702a3fd6293129d5dccc7d1deaf1cdbf834342a60b951351575013aba1e6fb7c82521e9ad2238d8206ed35d69a7ff8a16381c72ed23295cbab23cb3ab9b400df5788428ce2df3f74a51b54bc254764747e31244ab11a78e9331c9a18ad6116f1d3ed5861fd4be88371f9e82fe04798908bb6ac5c7f12ada64018e346199da67ba6ddcdb06a423094623f048c7f26fa6125", 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000080)=""/77) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000100)=""/79) socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 06:48:18 executing program 0: shmget(0x2, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x0) shmdt(0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000140), 0x4) add_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a05ec442692f9c8a6c810000f00fbab7000000217d65e09b6920375137c3d8c9c4c37c6d9ea80000004e670624f20f2bac090d000000bb00000040428fb07e6767e5410d45800f2e8f0850cc293201460f01ee420f820e00000027") 06:48:18 executing program 5: prctl$intptr(0x400000000004, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0x0) prlimit64(0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000440)=""/177) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/250) mq_open(&(0x7f0000000540)='\x00', 0x0, 0x0, &(0x7f0000000580)) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 06:48:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba694214aefdec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000098add1375f51e135848fea98c6e3574511e0c61ff22ff61f0000000000", 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)="637075616382742e75736167655f73797300564f2b1913679cfabc7112d19b94e7bde51d2559f5e7a110d690702a3fd6293129d5dccc7d1deaf1cdbf834342a60b951351575013aba1e6fb7c82521e9ad2238d8206ed35d69a7ff8a16381c72ed23295cbab23cb3ab9b400df5788428ce2df3f74a51b54bc254764747e31244ab11a78e9331c9a18ad6116f1d3ed5861fd4be88371f9e82fe04798908bb6ac5c7f12ada64018e346199da67ba6ddcdb06a423094623f048c7f26fa6125", 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000080)=""/77) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000100)=""/79) socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) [ 213.650681] syz-executor1 (7562) used greatest stack depth: 13848 bytes left 06:48:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba694214aefdec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000098add1375f51e135848fea98c6e3574511e0c61ff22ff61f0000000000", 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)="637075616382742e75736167655f73797300564f2b1913679cfabc7112d19b94e7bde51d2559f5e7a110d690702a3fd6293129d5dccc7d1deaf1cdbf834342a60b951351575013aba1e6fb7c82521e9ad2238d8206ed35d69a7ff8a16381c72ed23295cbab23cb3ab9b400df5788428ce2df3f74a51b54bc254764747e31244ab11a78e9331c9a18ad6116f1d3ed5861fd4be88371f9e82fe04798908bb6ac5c7f12ada64018e346199da67ba6ddcdb06a423094623f048c7f26fa6125", 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000080)=""/77) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000100)=""/79) socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 06:48:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba694214aefdec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000098add1375f51e135848fea98c6e3574511e0c61ff22ff61f0000000000", 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)="637075616382742e75736167655f73797300564f2b1913679cfabc7112d19b94e7bde51d2559f5e7a110d690702a3fd6293129d5dccc7d1deaf1cdbf834342a60b951351575013aba1e6fb7c82521e9ad2238d8206ed35d69a7ff8a16381c72ed23295cbab23cb3ab9b400df5788428ce2df3f74a51b54bc254764747e31244ab11a78e9331c9a18ad6116f1d3ed5861fd4be88371f9e82fe04798908bb6ac5c7f12ada64018e346199da67ba6ddcdb06a423094623f048c7f26fa6125", 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000080)=""/77) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000100)=""/79) socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 06:48:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba694214aefdec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000098add1375f51e135848fea98c6e3574511e0c61ff22ff61f0000000000", 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)="637075616382742e75736167655f73797300564f2b1913679cfabc7112d19b94e7bde51d2559f5e7a110d690702a3fd6293129d5dccc7d1deaf1cdbf834342a60b951351575013aba1e6fb7c82521e9ad2238d8206ed35d69a7ff8a16381c72ed23295cbab23cb3ab9b400df5788428ce2df3f74a51b54bc254764747e31244ab11a78e9331c9a18ad6116f1d3ed5861fd4be88371f9e82fe04798908bb6ac5c7f12ada64018e346199da67ba6ddcdb06a423094623f048c7f26fa6125", 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000080)=""/77) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000100)=""/79) socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 06:48:18 executing program 2: clock_gettime(0x7, &(0x7f0000000380)) clock_settime(0x0, &(0x7f00000001c0)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000440)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@ipv4={[], [], @loopback}}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a580)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f000000a680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a6c0)={{{@in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f000000a7c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a800)={{{@in6=@local, @in6=@ipv4={[], [], @local}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f000000a900)=0xe8) accept(0xffffffffffffffff, &(0x7f000000a940)=@xdp, &(0x7f0000000680)=0x37) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aa00)={@rand_addr, @broadcast}, &(0x7f000000aa40)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000bb00), 0x0, 0x0, &(0x7f000000bc00)={0x0, 0x989680}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000bc40)={{{@in6=@mcast1, @in6=@ipv4}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f000000bd40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000bec0)={0x0, @empty, @dev}, &(0x7f000000bf00)=0xfffffffffffffeb7) getpeername$packet(0xffffffffffffffff, &(0x7f000000bf40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000bfc0)={{{@in=@local}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f000000c0c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000240), &(0x7f000000c140)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c200)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000c240), &(0x7f000000c280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000c400)={{{@in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f000000c500)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0766969ef69dc00d99066410f55a4e088d557207c2a06c46129ef950000002140a564a70f157a9e400f01efe5e5417545c4e37d6d5200002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f7e") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) 06:48:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba694214aefdec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000098add1375f51e135848fea98c6e3574511e0c61ff22ff61f0000000000", 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)="637075616382742e75736167655f73797300564f2b1913679cfabc7112d19b94e7bde51d2559f5e7a110d690702a3fd6293129d5dccc7d1deaf1cdbf834342a60b951351575013aba1e6fb7c82521e9ad2238d8206ed35d69a7ff8a16381c72ed23295cbab23cb3ab9b400df5788428ce2df3f74a51b54bc254764747e31244ab11a78e9331c9a18ad6116f1d3ed5861fd4be88371f9e82fe04798908bb6ac5c7f12ada64018e346199da67ba6ddcdb06a423094623f048c7f26fa6125", 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000080)=""/77) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000100)=""/79) socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 06:48:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba694214aefdec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000098add1375f51e135848fea98c6e3574511e0c61ff22ff61f0000000000", 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)="637075616382742e75736167655f73797300564f2b1913679cfabc7112d19b94e7bde51d2559f5e7a110d690702a3fd6293129d5dccc7d1deaf1cdbf834342a60b951351575013aba1e6fb7c82521e9ad2238d8206ed35d69a7ff8a16381c72ed23295cbab23cb3ab9b400df5788428ce2df3f74a51b54bc254764747e31244ab11a78e9331c9a18ad6116f1d3ed5861fd4be88371f9e82fe04798908bb6ac5c7f12ada64018e346199da67ba6ddcdb06a423094623f048c7f26fa6125", 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000080)=""/77) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000100)=""/79) socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 06:48:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000004680)=[{{&(0x7f0000000ec0)=@nl, 0x80, &(0x7f0000001280)=[{&(0x7f00000033c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001300)=""/8, 0x8}}], 0x1, 0x0, 0x0) 06:48:19 executing program 5: futex(&(0x7f0000000040), 0xc, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 06:48:19 executing program 0: shmget(0x2, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x0) shmdt(0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000140), 0x4) add_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a05ec442692f9c8a6c810000f00fbab7000000217d65e09b6920375137c3d8c9c4c37c6d9ea80000004e670624f20f2bac090d000000bb00000040428fb07e6767e5410d45800f2e8f0850cc293201460f01ee420f820e00000027") 06:48:19 executing program 3: mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) dup2(0xffffffffffffffff, 0xffffffffffffff9c) fchdir(0xffffffffffffffff) getpid() socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) ftruncate(0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) syz_execute_func(&(0x7f0000000600)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000001c0)) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) 06:48:19 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/44, &(0x7f0000000280)=0x2c) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 06:48:19 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000240)=0x80) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @rand_addr}, &(0x7f0000000080)=0xc) syz_execute_func(&(0x7f0000000280)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 06:48:20 executing program 0: shmget(0x2, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x0) shmdt(0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000140), 0x4) add_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a05ec442692f9c8a6c810000f00fbab7000000217d65e09b6920375137c3d8c9c4c37c6d9ea80000004e670624f20f2bac090d000000bb00000040428fb07e6767e5410d45800f2e8f0850cc293201460f01ee420f820e00000027") 06:48:20 executing program 5: futex(&(0x7f0000000040), 0xc, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 06:48:20 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/44, &(0x7f0000000280)=0x2c) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 06:48:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000004680)=[{{&(0x7f0000000ec0)=@nl, 0x80, &(0x7f0000001280)=[{&(0x7f00000033c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001300)=""/8, 0x8}}], 0x1, 0x0, 0x0) 06:48:20 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/44, &(0x7f0000000280)=0x2c) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 06:48:20 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/44, &(0x7f0000000280)=0x2c) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 06:48:20 executing program 3: mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) dup2(0xffffffffffffffff, 0xffffffffffffff9c) fchdir(0xffffffffffffffff) getpid() socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) ftruncate(0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) syz_execute_func(&(0x7f0000000600)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000001c0)) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) 06:48:20 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000240)=0x80) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @rand_addr}, &(0x7f0000000080)=0xc) syz_execute_func(&(0x7f0000000280)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 06:48:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000300000000000000000000009500020000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYPTR64], 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000000)={r0, r1}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000006400)=[{{&(0x7f0000001f00)=@can, 0x80, &(0x7f0000002140)=[{&(0x7f0000001f80)=""/58, 0x3a}], 0x1, &(0x7f0000002180)=""/88, 0x58}}], 0x500, 0x0, &(0x7f00000065c0)={0x0, r3+30000000}) [ 216.023582] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 06:48:20 executing program 5: futex(&(0x7f0000000040), 0xc, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 06:48:20 executing program 0: shmget(0x2, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x0) shmdt(0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000140), 0x4) add_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a05ec442692f9c8a6c810000f00fbab7000000217d65e09b6920375137c3d8c9c4c37c6d9ea80000004e670624f20f2bac090d000000bb00000040428fb07e6767e5410d45800f2e8f0850cc293201460f01ee420f820e00000027") 06:48:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000004680)=[{{&(0x7f0000000ec0)=@nl, 0x80, &(0x7f0000001280)=[{&(0x7f00000033c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001300)=""/8, 0x8}}], 0x1, 0x0, 0x0) 06:48:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000300000000000000000000009500020000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYPTR64], 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000000)={r0, r1}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000006400)=[{{&(0x7f0000001f00)=@can, 0x80, &(0x7f0000002140)=[{&(0x7f0000001f80)=""/58, 0x3a}], 0x1, &(0x7f0000002180)=""/88, 0x58}}], 0x500, 0x0, &(0x7f00000065c0)={0x0, r3+30000000}) 06:48:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000300000000000000000000009500020000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYPTR64], 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000000)={r0, r1}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000006400)=[{{&(0x7f0000001f00)=@can, 0x80, &(0x7f0000002140)=[{&(0x7f0000001f80)=""/58, 0x3a}], 0x1, &(0x7f0000002180)=""/88, 0x58}}], 0x500, 0x0, &(0x7f00000065c0)={0x0, r3+30000000}) 06:48:21 executing program 3: mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) dup2(0xffffffffffffffff, 0xffffffffffffff9c) fchdir(0xffffffffffffffff) getpid() socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) ftruncate(0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) syz_execute_func(&(0x7f0000000600)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000001c0)) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) 06:48:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000300000000000000000000009500020000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYPTR64], 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000000)={r0, r1}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000006400)=[{{&(0x7f0000001f00)=@can, 0x80, &(0x7f0000002140)=[{&(0x7f0000001f80)=""/58, 0x3a}], 0x1, &(0x7f0000002180)=""/88, 0x58}}], 0x500, 0x0, &(0x7f00000065c0)={0x0, r3+30000000}) 06:48:21 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000240)=0x80) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @rand_addr}, &(0x7f0000000080)=0xc) syz_execute_func(&(0x7f0000000280)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 06:48:21 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x8, 0x0, &(0x7f0000000040)=[@increfs], 0x0, 0x0, &(0x7f0000000080)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, &(0x7f0000000100)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000c6dfd0)={0x8, 0x0, &(0x7f0000dd0000)=[@acquire={0x40046306}], 0x0, 0x0, &(0x7f0000008f37)}) [ 217.079648] binder: BINDER_SET_CONTEXT_MGR already set 06:48:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000004680)=[{{&(0x7f0000000ec0)=@nl, 0x80, &(0x7f0000001280)=[{&(0x7f00000033c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001300)=""/8, 0x8}}], 0x1, 0x0, 0x0) 06:48:21 executing program 5: futex(&(0x7f0000000040), 0xc, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 217.107893] binder: 7700:7701 ioctl 40046207 0 returned -16 06:48:21 executing program 0: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) getgroups(0x0, &(0x7f0000005ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005f00)) lstat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) fstat(0xffffffffffffffff, &(0x7f0000006000)) gettid() stat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)) stat(&(0x7f0000007740)='./file0/file0\x00', &(0x7f0000007780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007840)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007940)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 06:48:21 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x8, 0x0, &(0x7f0000000040)=[@increfs], 0x0, 0x0, &(0x7f0000000080)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, &(0x7f0000000100)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000c6dfd0)={0x8, 0x0, &(0x7f0000dd0000)=[@acquire={0x40046306}], 0x0, 0x0, &(0x7f0000008f37)}) 06:48:22 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x8, 0x0, &(0x7f0000000040)=[@increfs], 0x0, 0x0, &(0x7f0000000080)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, &(0x7f0000000100)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000c6dfd0)={0x8, 0x0, &(0x7f0000dd0000)=[@acquire={0x40046306}], 0x0, 0x0, &(0x7f0000008f37)}) 06:48:22 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x8, 0x0, &(0x7f0000000040)=[@increfs], 0x0, 0x0, &(0x7f0000000080)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000240)={0x4, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, &(0x7f0000000100)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000c6dfd0)={0x8, 0x0, &(0x7f0000dd0000)=[@acquire={0x40046306}], 0x0, 0x0, &(0x7f0000008f37)}) 06:48:22 executing program 2: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/110, 0x6e) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="408055a05f6969ef69dc00d9c421a05d2f8a20f2420f58410d8f6840cf880e00000001cdaeab3138211a40a5c441657538c48391683f000f01efe5e57d0f66f3f081900c0000007400653666400f55aa07000000e59a01460f01ee45ffde9f") gettid() socket$inet_tcp(0x2, 0x1, 0x0) sched_getscheduler(0x0) memfd_create(&(0x7f0000001480)='/dev/input/mice\x00', 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000002c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@local, @in=@broadcast}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xfffffffffffffd9a) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000700)=0xffffffce) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000a80)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000014c0)) stat(&(0x7f0000000b40)='./file0/file0\x00', &(0x7f0000000b80)) getgid() 06:48:22 executing program 3: mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) dup2(0xffffffffffffffff, 0xffffffffffffff9c) fchdir(0xffffffffffffffff) getpid() socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) ftruncate(0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) syz_execute_func(&(0x7f0000000600)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000001c0)) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) 06:48:22 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000240)=0x80) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @rand_addr}, &(0x7f0000000080)=0xc) syz_execute_func(&(0x7f0000000280)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 06:48:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x12, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x8}, 0x48) 06:48:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x4, 0x3, &(0x7f0000017000), &(0x7f0000005ff6)='syzkaller\x00', 0x1, 0xf4, &(0x7f000000c000)=""/244}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000001c000)={r0, 0x50, &(0x7f0000017000)}, 0xa) 06:48:22 executing program 0: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) getgroups(0x0, &(0x7f0000005ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005f00)) lstat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) fstat(0xffffffffffffffff, &(0x7f0000006000)) gettid() stat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)) stat(&(0x7f0000007740)='./file0/file0\x00', &(0x7f0000007780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007840)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007940)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 06:48:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x12, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x8}, 0x48) 06:48:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x4, 0x3, &(0x7f0000017000), &(0x7f0000005ff6)='syzkaller\x00', 0x1, 0xf4, &(0x7f000000c000)=""/244}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000001c000)={r0, 0x50, &(0x7f0000017000)}, 0xa) 06:48:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x12, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x8}, 0x48) 06:48:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x4, 0x3, &(0x7f0000017000), &(0x7f0000005ff6)='syzkaller\x00', 0x1, 0xf4, &(0x7f000000c000)=""/244}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000001c000)={r0, 0x50, &(0x7f0000017000)}, 0xa) 06:48:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x12, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x8}, 0x48) 06:48:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0x4, 0x3, &(0x7f0000017000), &(0x7f0000005ff6)='syzkaller\x00', 0x1, 0xf4, &(0x7f000000c000)=""/244}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000001c000)={r0, 0x50, &(0x7f0000017000)}, 0xa) 06:48:23 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 06:48:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/5) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={"393b0000000004000000000000110400"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000040)="0f425f69f20f38f10b650feda5000066b9800000c00f326635004000000f30b80d008ec86666de3c0f01cf260f01cb2665660f3a618c0060540fc76b39", 0x3d}], 0x1, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x1, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{}]}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000002c0)={0x7c, 0x8fe, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x136, 0x0, 0x99}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f0000000300), 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0x10b, 0x9e, 0x8000, 0x37a, 0x32f, 0x0, 0xbb}, "", [[], [], [], [], [], []]}, 0x620) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000001d40)={0x400000008, 0x400fd}) 06:48:23 executing program 4: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000d40)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000e40)=0xe8) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f00000005c0)={0xa, 0x0, 0x0, @local}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000400)={&(0x7f0000000680)=@newtclass={0x24}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'veth1_to_bond\x00'}) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000240)=0xfffffd9c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd25204e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 06:48:23 executing program 3: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) prctl$setname(0x34, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000700)=""/67, &(0x7f0000000200)=0x43) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000500)=""/119, 0x77, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000580)}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000640), 0x8) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 06:48:23 executing program 2: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/110, 0x6e) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="408055a05f6969ef69dc00d9c421a05d2f8a20f2420f58410d8f6840cf880e00000001cdaeab3138211a40a5c441657538c48391683f000f01efe5e57d0f66f3f081900c0000007400653666400f55aa07000000e59a01460f01ee45ffde9f") gettid() socket$inet_tcp(0x2, 0x1, 0x0) sched_getscheduler(0x0) memfd_create(&(0x7f0000001480)='/dev/input/mice\x00', 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000002c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@local, @in=@broadcast}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xfffffffffffffd9a) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000700)=0xffffffce) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000a80)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000014c0)) stat(&(0x7f0000000b40)='./file0/file0\x00', &(0x7f0000000b80)) getgid() 06:48:23 executing program 0: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) getgroups(0x0, &(0x7f0000005ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005f00)) lstat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) fstat(0xffffffffffffffff, &(0x7f0000006000)) gettid() stat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)) stat(&(0x7f0000007740)='./file0/file0\x00', &(0x7f0000007780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007840)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007940)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") [ 219.042263] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 06:48:23 executing program 3: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) prctl$setname(0x34, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000700)=""/67, &(0x7f0000000200)=0x43) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000500)=""/119, 0x77, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000580)}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000640), 0x8) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") [ 219.233266] sched: DL replenish lagged too much 06:48:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/5) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={"393b0000000004000000000000110400"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000040)="0f425f69f20f38f10b650feda5000066b9800000c00f326635004000000f30b80d008ec86666de3c0f01cf260f01cb2665660f3a618c0060540fc76b39", 0x3d}], 0x1, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x1, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{}]}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000002c0)={0x7c, 0x8fe, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x136, 0x0, 0x99}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f0000000300), 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0x10b, 0x9e, 0x8000, 0x37a, 0x32f, 0x0, 0xbb}, "", [[], [], [], [], [], []]}, 0x620) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000001d40)={0x400000008, 0x400fd}) 06:48:24 executing program 3: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) prctl$setname(0x34, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000700)=""/67, &(0x7f0000000200)=0x43) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000500)=""/119, 0x77, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000580)}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000640), 0x8) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 06:48:24 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 06:48:24 executing program 3: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) prctl$setname(0x34, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000700)=""/67, &(0x7f0000000200)=0x43) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000500)=""/119, 0x77, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000580)}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000640), 0x8) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 06:48:24 executing program 2: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/110, 0x6e) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="408055a05f6969ef69dc00d9c421a05d2f8a20f2420f58410d8f6840cf880e00000001cdaeab3138211a40a5c441657538c48391683f000f01efe5e57d0f66f3f081900c0000007400653666400f55aa07000000e59a01460f01ee45ffde9f") gettid() socket$inet_tcp(0x2, 0x1, 0x0) sched_getscheduler(0x0) memfd_create(&(0x7f0000001480)='/dev/input/mice\x00', 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000002c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@local, @in=@broadcast}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xfffffffffffffd9a) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000700)=0xffffffce) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000a80)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000014c0)) stat(&(0x7f0000000b40)='./file0/file0\x00', &(0x7f0000000b80)) getgid() 06:48:24 executing program 4: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000d40)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000e40)=0xe8) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f00000005c0)={0xa, 0x0, 0x0, @local}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000400)={&(0x7f0000000680)=@newtclass={0x24}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'veth1_to_bond\x00'}) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000240)=0xfffffd9c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd25204e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 06:48:24 executing program 0: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) getgroups(0x0, &(0x7f0000005ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005f00)) lstat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) fstat(0xffffffffffffffff, &(0x7f0000006000)) gettid() stat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)) stat(&(0x7f0000007740)='./file0/file0\x00', &(0x7f0000007780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007840)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007940)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 06:48:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/5) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={"393b0000000004000000000000110400"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000040)="0f425f69f20f38f10b650feda5000066b9800000c00f326635004000000f30b80d008ec86666de3c0f01cf260f01cb2665660f3a618c0060540fc76b39", 0x3d}], 0x1, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x1, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{}]}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000002c0)={0x7c, 0x8fe, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x136, 0x0, 0x99}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f0000000300), 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0x10b, 0x9e, 0x8000, 0x37a, 0x32f, 0x0, 0xbb}, "", [[], [], [], [], [], []]}, 0x620) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000001d40)={0x400000008, 0x400fd}) 06:48:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/5) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={"393b0000000004000000000000110400"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000040)="0f425f69f20f38f10b650feda5000066b9800000c00f326635004000000f30b80d008ec86666de3c0f01cf260f01cb2665660f3a618c0060540fc76b39", 0x3d}], 0x1, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x1, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{}]}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000002c0)={0x7c, 0x8fe, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x136, 0x0, 0x99}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f0000000300), 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0x10b, 0x9e, 0x8000, 0x37a, 0x32f, 0x0, 0xbb}, "", [[], [], [], [], [], []]}, 0x620) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000001d40)={0x400000008, 0x400fd}) 06:48:25 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 06:48:25 executing program 2: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/110, 0x6e) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="408055a05f6969ef69dc00d9c421a05d2f8a20f2420f58410d8f6840cf880e00000001cdaeab3138211a40a5c441657538c48391683f000f01efe5e57d0f66f3f081900c0000007400653666400f55aa07000000e59a01460f01ee45ffde9f") gettid() socket$inet_tcp(0x2, 0x1, 0x0) sched_getscheduler(0x0) memfd_create(&(0x7f0000001480)='/dev/input/mice\x00', 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000002c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@local, @in=@broadcast}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xfffffffffffffd9a) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000700)=0xffffffce) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000a80)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000014c0)) stat(&(0x7f0000000b40)='./file0/file0\x00', &(0x7f0000000b80)) getgid() 06:48:25 executing program 4: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000d40)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000e40)=0xe8) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f00000005c0)={0xa, 0x0, 0x0, @local}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000400)={&(0x7f0000000680)=@newtclass={0x24}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'veth1_to_bond\x00'}) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000240)=0xfffffd9c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd25204e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 06:48:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/5) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={"393b0000000004000000000000110400"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000040)="0f425f69f20f38f10b650feda5000066b9800000c00f326635004000000f30b80d008ec86666de3c0f01cf260f01cb2665660f3a618c0060540fc76b39", 0x3d}], 0x1, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x1, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{}]}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000002c0)={0x7c, 0x8fe, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x136, 0x0, 0x99}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f0000000300), 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0x10b, 0x9e, 0x8000, 0x37a, 0x32f, 0x0, 0xbb}, "", [[], [], [], [], [], []]}, 0x620) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000001d40)={0x400000008, 0x400fd}) 06:48:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/5) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={"393b0000000004000000000000110400"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000040)="0f425f69f20f38f10b650feda5000066b9800000c00f326635004000000f30b80d008ec86666de3c0f01cf260f01cb2665660f3a618c0060540fc76b39", 0x3d}], 0x1, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x1, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{}]}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000002c0)={0x7c, 0x8fe, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x136, 0x0, 0x99}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f0000000300), 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0x10b, 0x9e, 0x8000, 0x37a, 0x32f, 0x0, 0xbb}, "", [[], [], [], [], [], []]}, 0x620) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000001d40)={0x400000008, 0x400fd}) 06:48:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/5) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={"393b0000000004000000000000110400"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000040)="0f425f69f20f38f10b650feda5000066b9800000c00f326635004000000f30b80d008ec86666de3c0f01cf260f01cb2665660f3a618c0060540fc76b39", 0x3d}], 0x1, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x1, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{}]}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000002c0)={0x7c, 0x8fe, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x136, 0x0, 0x99}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f0000000300), 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0x10b, 0x9e, 0x8000, 0x37a, 0x32f, 0x0, 0xbb}, "", [[], [], [], [], [], []]}, 0x620) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000001d40)={0x400000008, 0x400fd}) 06:48:26 executing program 1: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000400), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 06:48:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/5) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={"393b0000000004000000000000110400"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000040)="0f425f69f20f38f10b650feda5000066b9800000c00f326635004000000f30b80d008ec86666de3c0f01cf260f01cb2665660f3a618c0060540fc76b39", 0x3d}], 0x1, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x1, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{}]}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000002c0)={0x7c, 0x8fe, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x136, 0x0, 0x99}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f0000000300), 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0x10b, 0x9e, 0x8000, 0x37a, 0x32f, 0x0, 0xbb}, "", [[], [], [], [], [], []]}, 0x620) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000001d40)={0x400000008, 0x400fd}) 06:48:27 executing program 2: getrandom(&(0x7f00000006c0)=""/148, 0x34a, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) pipe(&(0x7f00000000c0)) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') clock_getres(0x0, &(0x7f0000000140)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") clock_gettime(0x0, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 06:48:27 executing program 4: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000d40)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000e40)=0xe8) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, &(0x7f00000005c0)={0xa, 0x0, 0x0, @local}, 0x1c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000400)={&(0x7f0000000680)=@newtclass={0x24}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'veth1_to_bond\x00'}) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000240)=0xfffffd9c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd25204e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 06:48:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/5) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={"393b0000000004000000000000110400"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000040)="0f425f69f20f38f10b650feda5000066b9800000c00f326635004000000f30b80d008ec86666de3c0f01cf260f01cb2665660f3a618c0060540fc76b39", 0x3d}], 0x1, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x1, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{}]}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000002c0)={0x7c, 0x8fe, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x136, 0x0, 0x99}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f0000000300), 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0x10b, 0x9e, 0x8000, 0x37a, 0x32f, 0x0, 0xbb}, "", [[], [], [], [], [], []]}, 0x620) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000001d40)={0x400000008, 0x400fd}) 06:48:27 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000240)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 06:48:27 executing program 2: getrandom(&(0x7f00000006c0)=""/148, 0x34a, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) pipe(&(0x7f00000000c0)) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') clock_getres(0x0, &(0x7f0000000140)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") clock_gettime(0x0, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 06:48:27 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000240)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 06:48:27 executing program 2: getrandom(&(0x7f00000006c0)=""/148, 0x34a, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) pipe(&(0x7f00000000c0)) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') clock_getres(0x0, &(0x7f0000000140)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") clock_gettime(0x0, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 06:48:28 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000240)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 06:48:28 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0x81785501, &(0x7f0000000040)) 06:48:28 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0x81785501, &(0x7f0000000040)) 06:48:28 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000240)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 06:48:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/5) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={"393b0000000004000000000000110400"}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000040)="0f425f69f20f38f10b650feda5000066b9800000c00f326635004000000f30b80d008ec86666de3c0f01cf260f01cb2665660f3a618c0060540fc76b39", 0x3d}], 0x1, 0x0, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x1, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{}]}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000002c0)={0x7c, 0x8fe, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x136, 0x0, 0x99}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f0000000300), 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)={{0x10b, 0x9e, 0x8000, 0x37a, 0x32f, 0x0, 0xbb}, "", [[], [], [], [], [], []]}, 0x620) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000001d40)={0x400000008, 0x400fd}) 06:48:28 executing program 4: prctl$intptr(0x400000000021, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast2, @in6=@loopback}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6, @in6=@remote}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000380)={{{@in, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000540)={{{@in, @in=@broadcast}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @loopback}, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000780)=0xe8) openat$ipvs(0xffffffffffffff9c, &(0x7f00000010c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000001100)={0x77359400}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000007c0)={{{@in6=@mcast2, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@local}}, &(0x7f00000008c0)=0xe8) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000c00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000c40)) lstat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e00), &(0x7f0000000e40)=0xc) getegid() getgid() syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 06:48:28 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000240)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 06:48:28 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0x81785501, &(0x7f0000000040)) 06:48:28 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000240)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 06:48:28 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0xffff, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) connect$unix(r0, &(0x7f0000000240)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 06:48:28 executing program 2: getrandom(&(0x7f00000006c0)=""/148, 0x34a, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) pipe(&(0x7f00000000c0)) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') clock_getres(0x0, &(0x7f0000000140)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") clock_gettime(0x0, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 06:48:28 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0x81785501, &(0x7f0000000040)) 06:48:28 executing program 4: rt_sigpending(&(0x7f00000000c0), 0x8) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000280)) openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000580)="42805da00fef69dc0f01ee26a8d8c40191d58a000000009eeaeaacc041cbcb3e3636a72900770f789958ea2350887f0606eafa6b2179660f38302f66470f73f70a8af5c44379dfb9d6adbe90dfe298c4a17ee6127e") accept(0xffffffffffffffff, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={@mcast2}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'veth0_to_bond\x00'}) clock_gettime(0x0, &(0x7f0000007b40)) recvmmsg(0xffffffffffffffff, &(0x7f0000007a00), 0x0, 0x0, &(0x7f0000007b80)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007c00)={@loopback, @loopback}, &(0x7f0000007c40)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007c80)={@ipv4={[], [], @multicast1}}, &(0x7f0000007cc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007d80)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000007e80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007ec0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007f00)={0x0, @empty, @multicast1}, &(0x7f0000007f40)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000007f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007fc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008000)={@dev}, &(0x7f0000008040)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008080)={{{@in=@dev, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000008180)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f00000081c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008200)=0x14, 0x0) 06:48:28 executing program 5: setrlimit(0x0, &(0x7f00000000c0)) pipe2(&(0x7f0000000400), 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000600)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000480)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000340)={"6070767100000000f4ff00"}, &(0x7f00000005c0)=0x1e) finit_module(0xffffffffffffffff, &(0x7f00000003c0)="73797374656d99656d31242ec600", 0x0) syz_emit_ethernet(0x0, &(0x7f0000000480)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000010a80)={{{@in=@remote, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000010b80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000010d00)={0x0, @dev, @broadcast}, &(0x7f0000010d40)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000010d80)={0x0, @rand_addr, @dev}, &(0x7f0000010dc0)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000540), 0xc, &(0x7f0000000500)={&(0x7f0000000580)={0x14}, 0xfffffffffffffcac}}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) syz_execute_func(&(0x7f0000000380)="42805da0c70f854f26000073fe19fa400f1822420fc70b1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179467aa2e541440f815d9d00000f2efb1a1a010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 06:48:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000200), &(0x7f0000000240)=0x4) 06:48:28 executing program 3: clock_gettime(0x1, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000300), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ec0)={{{@in, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002fc0)=0xe8) getegid() accept(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x3a) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) sysfs$2(0x2, 0x0, &(0x7f0000000080)=""/47) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240), 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)) socket$kcm(0x29, 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000030c0)={{{@in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000031c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000033c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000200)) 06:48:29 executing program 2: clock_gettime(0x8, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) geteuid() request_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/vcs\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f00000006c0)='em0\x00', 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000f00)=""/4096) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000a80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @dev}, &(0x7f0000000bc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001f00), &(0x7f0000001f40)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001f80)=@can, &(0x7f0000002000)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002040)={@loopback}, &(0x7f0000002080)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004940)={0x0, @local, @dev}, &(0x7f0000004980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006f80)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000070c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000071c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000072c0)={'vcan0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") 06:48:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000200), &(0x7f0000000240)=0x4) 06:48:29 executing program 5: setrlimit(0x0, &(0x7f00000000c0)) pipe2(&(0x7f0000000400), 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000600)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000480)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000340)={"6070767100000000f4ff00"}, &(0x7f00000005c0)=0x1e) finit_module(0xffffffffffffffff, &(0x7f00000003c0)="73797374656d99656d31242ec600", 0x0) syz_emit_ethernet(0x0, &(0x7f0000000480)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000010a80)={{{@in=@remote, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000010b80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000010d00)={0x0, @dev, @broadcast}, &(0x7f0000010d40)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000010d80)={0x0, @rand_addr, @dev}, &(0x7f0000010dc0)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000540), 0xc, &(0x7f0000000500)={&(0x7f0000000580)={0x14}, 0xfffffffffffffcac}}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) syz_execute_func(&(0x7f0000000380)="42805da0c70f854f26000073fe19fa400f1822420fc70b1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179467aa2e541440f815d9d00000f2efb1a1a010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 06:48:29 executing program 0: keyctl$set_reqkey_keyring(0x5, 0x17bdc377) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0aa878769ef69dcc4227d5a3d4a000000868441ff0f1837370ec19086fbd9f28fc423b17ac7f2c4217c291a1586eedadae14b2a492d64f04008346d00000000237532bbbbe33f78780966dcdfa358b70647ff745c1ec4615954317f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xff5e) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000500)='cgroup.procs\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) getpgid(0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000200), &(0x7f0000000240)=0x4) 06:48:29 executing program 0: keyctl$set_reqkey_keyring(0x5, 0x17bdc377) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0aa878769ef69dcc4227d5a3d4a000000868441ff0f1837370ec19086fbd9f28fc423b17ac7f2c4217c291a1586eedadae14b2a492d64f04008346d00000000237532bbbbe33f78780966dcdfa358b70647ff745c1ec4615954317f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xff5e) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000500)='cgroup.procs\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) getpgid(0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000200), &(0x7f0000000240)=0x4) 06:48:29 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000040)='eth1trustedppp0vboxnet1vboxnet0\x00'}, 0x30) getpgid(0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x0, 0x0) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 06:48:29 executing program 3: clock_gettime(0x1, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000300), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ec0)={{{@in, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002fc0)=0xe8) getegid() accept(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x3a) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) sysfs$2(0x2, 0x0, &(0x7f0000000080)=""/47) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240), 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)) socket$kcm(0x29, 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000030c0)={{{@in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000031c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000033c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000200)) 06:48:29 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)={0x15, 0x7, 0x0, {{0x8, 'keyring\x00'}}}, 0x15) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) 06:48:29 executing program 5: setrlimit(0x0, &(0x7f00000000c0)) pipe2(&(0x7f0000000400), 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000600)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000480)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000340)={"6070767100000000f4ff00"}, &(0x7f00000005c0)=0x1e) finit_module(0xffffffffffffffff, &(0x7f00000003c0)="73797374656d99656d31242ec600", 0x0) syz_emit_ethernet(0x0, &(0x7f0000000480)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000010a80)={{{@in=@remote, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000010b80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000010d00)={0x0, @dev, @broadcast}, &(0x7f0000010d40)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000010d80)={0x0, @rand_addr, @dev}, &(0x7f0000010dc0)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000540), 0xc, &(0x7f0000000500)={&(0x7f0000000580)={0x14}, 0xfffffffffffffcac}}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) syz_execute_func(&(0x7f0000000380)="42805da0c70f854f26000073fe19fa400f1822420fc70b1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179467aa2e541440f815d9d00000f2efb1a1a010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 06:48:29 executing program 0: keyctl$set_reqkey_keyring(0x5, 0x17bdc377) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0aa878769ef69dcc4227d5a3d4a000000868441ff0f1837370ec19086fbd9f28fc423b17ac7f2c4217c291a1586eedadae14b2a492d64f04008346d00000000237532bbbbe33f78780966dcdfa358b70647ff745c1ec4615954317f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xff5e) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000500)='cgroup.procs\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) getpgid(0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:30 executing program 2: clock_gettime(0x8, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) geteuid() request_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/vcs\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f00000006c0)='em0\x00', 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000f00)=""/4096) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000a80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @dev}, &(0x7f0000000bc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001f00), &(0x7f0000001f40)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001f80)=@can, &(0x7f0000002000)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002040)={@loopback}, &(0x7f0000002080)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004940)={0x0, @local, @dev}, &(0x7f0000004980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006f80)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000070c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000071c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000072c0)={'vcan0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") 06:48:30 executing program 0: keyctl$set_reqkey_keyring(0x5, 0x17bdc377) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0aa878769ef69dcc4227d5a3d4a000000868441ff0f1837370ec19086fbd9f28fc423b17ac7f2c4217c291a1586eedadae14b2a492d64f04008346d00000000237532bbbbe33f78780966dcdfa358b70647ff745c1ec4615954317f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getegid() openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xff5e) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000500)='cgroup.procs\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) getpgid(0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:30 executing program 5: setrlimit(0x0, &(0x7f00000000c0)) pipe2(&(0x7f0000000400), 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000600)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000480)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000340)={"6070767100000000f4ff00"}, &(0x7f00000005c0)=0x1e) finit_module(0xffffffffffffffff, &(0x7f00000003c0)="73797374656d99656d31242ec600", 0x0) syz_emit_ethernet(0x0, &(0x7f0000000480)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000010a80)={{{@in=@remote, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000010b80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000010d00)={0x0, @dev, @broadcast}, &(0x7f0000010d40)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000010d80)={0x0, @rand_addr, @dev}, &(0x7f0000010dc0)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000540), 0xc, &(0x7f0000000500)={&(0x7f0000000580)={0x14}, 0xfffffffffffffcac}}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) syz_execute_func(&(0x7f0000000380)="42805da0c70f854f26000073fe19fa400f1822420fc70b1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179467aa2e541440f815d9d00000f2efb1a1a010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 06:48:30 executing program 3: clock_gettime(0x1, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000300), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ec0)={{{@in, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002fc0)=0xe8) getegid() accept(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x3a) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) sysfs$2(0x2, 0x0, &(0x7f0000000080)=""/47) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240), 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)) socket$kcm(0x29, 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000030c0)={{{@in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000031c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000033c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000200)) 06:48:30 executing program 0: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180)="a4", 0x1, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000700), 0x0, 0x0) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380), &(0x7f0000000040), 0x0, 0xfffffffffffffffe) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/llc\x00') write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) creat(&(0x7f0000000500)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000540), 0x40001ce, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:30 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000040)='eth1trustedppp0vboxnet1vboxnet0\x00'}, 0x30) getpgid(0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x0, 0x0) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 06:48:30 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)={0x15, 0x7, 0x0, {{0x8, 'keyring\x00'}}}, 0x15) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) 06:48:30 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x8000, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x437, &(0x7f0000000700)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x401, 0x11, 0x0, @dev, @local, {[], @dccp={{0x0, 0x4e20, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}, "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"}}}}}}, &(0x7f0000001780)) 06:48:30 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x8000, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x437, &(0x7f0000000700)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x401, 0x11, 0x0, @dev, @local, {[], @dccp={{0x0, 0x4e20, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}, "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"}}}}}}, &(0x7f0000001780)) 06:48:31 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x8000, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x437, &(0x7f0000000700)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x401, 0x11, 0x0, @dev, @local, {[], @dccp={{0x0, 0x4e20, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}, "2b00b32def4f1142b6793bb530f9b20e90aa25d5c2b9431efd840a07c1922833b2c789aefbbaee9f63cbab38a8acfb8dba0595ecb683e74ea2bc44a7aee9c52e18ca01c06a5c354712b8b1ff75f45ba55a3487c83849023d37e037d2d3e3e842e9ba099e9ed8775d1173d8e78335aa65d58f54c1d78d4fce897cfefa24b7f268f90be76c7f4e1bfe4d84a869353e931c3732afea55697618a1318ecb657b34172b93fd59d7988d43630cf81e976a0ea01fd8b2547ab593bc605c985f56664b84ed3c9f90ffb666e030c794e2d2d5070af38d83dc275da88cfe6910b2ded59f6c418af5d247237eceb14857c1d7c3ee32e729d9793040f8f4e432eb875a89fe31cbed117f0e76643797169fba3dac3f377d145ce97980ba626da7a279e698a9e040a22d63c535f0ee06adb59e9e06ad7295e6601f3a5fe9b581975993c6c775734212bccb26288d42a672c965d40e80d0e1908f04425a60a08241378ec7ff88315de073b64c5f9647e51732be34988e0948f12e6c560bedbece811bca501d4389dbfe20e4df5160cd7324c0670c7b3e8980b061e31b1c8461d6f7a63f9e9fd24326924c076e01631a0b9703a6106accfaa064075fa1f16e16c5171b6a324e8642b2ab76618b824110c312ab12d9f65d6a980634a6a7cba8bf89e01a91259f446232476a1c490982636b78d1300befab1a2f6e8261e07336c5692db37bb7d3cebf4a942b62f2fa6cceb7e488aa02b2e52c6f82bd3792845fff41cce52e0469d14821ce11491864860c11421a92dae3152eb23106a0c679d2b1f0a9809b56abdcf893f9531508f24e64ec911fd8e8b3c8fd2291f1a7b910222c38533d4caadac9acd194be7e53549c1719bdf668887a0e19db83b5356f8f7d93cbef1ef3505dcc40d0d2a02a2745ab518979b9c3774babfe8e70ead767c7a00289b8cc6e51d1a957548270cb3f5064961a88f61b34f9442d78ae5a8551713f9afb4269d689f9adb6b4a902a637184f7f899efe9fa0ddb45cd1076c4eeeda51ca8dc20dcfc9cc5f56768073b3f4c2c9f543324a4fd0b8bc7b95e232bf85bf222394fa4336ab4007d7ad2dc85afa6eb79ad2624c4be6c674ee98fce9a51786b7cc2b5044de114d36d2690e13bcedf96590c7d5aeb8040b74c4d6a5aa38a7c1f0857522f4f968795056b9a7034dc3444784f9486b575e44dec3216d72845500e63297d7197961e7e593ea3411001d1d47ba42d70e7af8e91246c02d7e37ff0eb60abebc37dd00315b4fbb09e77a6b5f7e8441818ebcfafecf622731f1db8a11fa2de8e30d808bedbfee104b3b1100f5094675521da07dd2a28be7e486b325a0f0e6d75116be1bbc2aa20deb64a6e4e7b824b12d009e6f1802f5a8e31559b125d71d00a5684fbde4668f5af1eb4ca04fa7c4ef4d2a194b0856e007"}}}}}}, &(0x7f0000001780)) 06:48:31 executing program 2: clock_gettime(0x8, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) geteuid() request_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/vcs\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f00000006c0)='em0\x00', 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000f00)=""/4096) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000a80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @dev}, &(0x7f0000000bc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001f00), &(0x7f0000001f40)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001f80)=@can, &(0x7f0000002000)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002040)={@loopback}, &(0x7f0000002080)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004940)={0x0, @local, @dev}, &(0x7f0000004980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006f80)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000070c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000071c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000072c0)={'vcan0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") 06:48:31 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x8000, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x437, &(0x7f0000000700)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x401, 0x11, 0x0, @dev, @local, {[], @dccp={{0x0, 0x4e20, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}, "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"}}}}}}, &(0x7f0000001780)) 06:48:31 executing program 5: prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/loop-control\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) io_setup(0x0, &(0x7f00000005c0)) io_cancel(0x0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000600)}, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) listxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/28, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) getresgid(&(0x7f00000004c0), &(0x7f0000000180), &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) getegid() getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) getegid() getgroups(0x0, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000840)="428055a0b2878769ef69dc00d9868441ff0f1837373addc422d50b20c1906986fbd9f28f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042aff4333358b70647ff745c1e1f7f") 06:48:31 executing program 3: clock_gettime(0x1, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000300), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ec0)={{{@in, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000002fc0)=0xe8) getegid() accept(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x3a) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) sysfs$2(0x2, 0x0, &(0x7f0000000080)=""/47) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240), 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)) socket$kcm(0x29, 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000030c0)={{{@in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000031c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f00000033c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000200)) 06:48:31 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000040)='eth1trustedppp0vboxnet1vboxnet0\x00'}, 0x30) getpgid(0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x0, 0x0) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 06:48:31 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)={0x15, 0x7, 0x0, {{0x8, 'keyring\x00'}}}, 0x15) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) 06:48:31 executing program 0: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180)="a4", 0x1, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000700), 0x0, 0x0) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380), &(0x7f0000000040), 0x0, 0xfffffffffffffffe) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/llc\x00') write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) creat(&(0x7f0000000500)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000540), 0x40001ce, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:32 executing program 2: clock_gettime(0x8, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) geteuid() request_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/vcs\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f00000006c0)='em0\x00', 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000f00)=""/4096) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000a80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @dev}, &(0x7f0000000bc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001f00), &(0x7f0000001f40)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001f80)=@can, &(0x7f0000002000)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002040)={@loopback}, &(0x7f0000002080)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004940)={0x0, @local, @dev}, &(0x7f0000004980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006f80)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000070c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000071c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000072c0)={'vcan0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") 06:48:32 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0x6, 0x4, 0xa6, 0x62}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000200), &(0x7f0000000400)}, 0x20) 06:48:32 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000040)='eth1trustedppp0vboxnet1vboxnet0\x00'}, 0x30) getpgid(0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x0, 0x0) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 06:48:32 executing program 5: prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/loop-control\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) io_setup(0x0, &(0x7f00000005c0)) io_cancel(0x0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000600)}, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) listxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/28, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) getresgid(&(0x7f00000004c0), &(0x7f0000000180), &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) getegid() getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) getegid() getgroups(0x0, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000840)="428055a0b2878769ef69dc00d9868441ff0f1837373addc422d50b20c1906986fbd9f28f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042aff4333358b70647ff745c1e1f7f") 06:48:32 executing program 0: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180)="a4", 0x1, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000700), 0x0, 0x0) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380), &(0x7f0000000040), 0x0, 0xfffffffffffffffe) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/llc\x00') write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) creat(&(0x7f0000000500)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000540), 0x40001ce, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:32 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)={0x15, 0x7, 0x0, {{0x8, 'keyring\x00'}}}, 0x15) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) 06:48:32 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0x6, 0x4, 0xa6, 0x62}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000200), &(0x7f0000000400)}, 0x20) 06:48:32 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0x6, 0x4, 0xa6, 0x62}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000200), &(0x7f0000000400)}, 0x20) 06:48:32 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0x6, 0x4, 0xa6, 0x62}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000200), &(0x7f0000000400)}, 0x20) 06:48:32 executing program 2: clock_gettime(0x0, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f00000004c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)) pipe(&(0x7f00000004c0)) openat$vhci(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vhci\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f00000006c0)='/dev/midi#\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000740)=0xffffffffffffff76) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000400), 0x0, 0x0, 0xfffffffffffffffd) keyctl$assume_authority(0x10, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) sched_setscheduler(0x0, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000540)="f9428055a0b4b48768ef61dc69c0d9d9008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") socket$inet6_udp(0xa, 0x2, 0x0) accept(0xffffffffffffffff, &(0x7f0000000600)=@ethernet={0x0, @remote}, &(0x7f0000000240)=0x80) syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) pipe2(&(0x7f0000000340), 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f00000004c0), 0x1601, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) syz_open_procfs(0x0, &(0x7f0000000240)='auxv\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x10000006, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@local, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") syncfs(0xffffffffffffffff) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000800)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000200)}}}) 06:48:33 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) keyctl$invalidate(0x15, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=""/116, &(0x7f0000000280)=0x74) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000000)) getpid() syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_cache\x00') setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 06:48:33 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x46, &(0x7f0000000180)=""/40, &(0x7f0000001000)=0x28) 06:48:33 executing program 5: prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/loop-control\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) io_setup(0x0, &(0x7f00000005c0)) io_cancel(0x0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000600)}, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) listxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/28, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) getresgid(&(0x7f00000004c0), &(0x7f0000000180), &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) getegid() getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) getegid() getgroups(0x0, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000840)="428055a0b2878769ef69dc00d9868441ff0f1837373addc422d50b20c1906986fbd9f28f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042aff4333358b70647ff745c1e1f7f") 06:48:33 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x46, &(0x7f0000000180)=""/40, &(0x7f0000001000)=0x28) 06:48:33 executing program 0: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180)="a4", 0x1, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000700), 0x0, 0x0) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380), &(0x7f0000000040), 0x0, 0xfffffffffffffffe) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/llc\x00') write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) creat(&(0x7f0000000500)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000540), 0x40001ce, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:33 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000280)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='tunl0\x00'}) syz_execute_func(&(0x7f0000000680)="42805da051c48215b6250a0000000595c3300dc4218812ccc39fe0f58e7e0cc4e3c5687800d3a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") getrusage(0x0, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000000)) sysinfo(&(0x7f0000000140)=""/245) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3845c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@empty, @multicast2}, &(0x7f0000000300)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@empty, @broadcast}, &(0x7f0000000500)=0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={0xffffffffffffffff, &(0x7f0000000540)}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @rand_addr}, &(0x7f0000000a40)=0x4c) 06:48:33 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x46, &(0x7f0000000180)=""/40, &(0x7f0000001000)=0x28) 06:48:33 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x46, &(0x7f0000000180)=""/40, &(0x7f0000001000)=0x28) 06:48:33 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r1, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x0, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000480)=""/4096, 0x1000, 0x0, &(0x7f0000001480)={0x1a, 0x0, 0x1, 0x2, 0x1, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r2 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000001580)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x12) r4 = semget$private(0x0, 0x1, 0x190) semop(r4, &(0x7f0000001540), 0x0) socket(0x10, 0x3, 0xa) rmdir(&(0x7f0000001500)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)}, 0x0) 06:48:33 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r1, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x0, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000480)=""/4096, 0x1000, 0x0, &(0x7f0000001480)={0x1a, 0x0, 0x1, 0x2, 0x1, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r2 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000001580)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x12) r4 = semget$private(0x0, 0x1, 0x190) semop(r4, &(0x7f0000001540), 0x0) socket(0x10, 0x3, 0xa) rmdir(&(0x7f0000001500)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)}, 0x0) 06:48:34 executing program 2: clock_gettime(0x0, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f00000004c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)) pipe(&(0x7f00000004c0)) openat$vhci(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vhci\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f00000006c0)='/dev/midi#\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000740)=0xffffffffffffff76) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000400), 0x0, 0x0, 0xfffffffffffffffd) keyctl$assume_authority(0x10, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) sched_setscheduler(0x0, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000540)="f9428055a0b4b48768ef61dc69c0d9d9008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") socket$inet6_udp(0xa, 0x2, 0x0) accept(0xffffffffffffffff, &(0x7f0000000600)=@ethernet={0x0, @remote}, &(0x7f0000000240)=0x80) syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) pipe2(&(0x7f0000000340), 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f00000004c0), 0x1601, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) syz_open_procfs(0x0, &(0x7f0000000240)='auxv\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x10000006, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@local, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") syncfs(0xffffffffffffffff) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000800)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000200)}}}) 06:48:34 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) keyctl$invalidate(0x15, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=""/116, &(0x7f0000000280)=0x74) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000000)) getpid() syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_cache\x00') setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 06:48:34 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r1, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x0, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000480)=""/4096, 0x1000, 0x0, &(0x7f0000001480)={0x1a, 0x0, 0x1, 0x2, 0x1, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r2 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000001580)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x12) r4 = semget$private(0x0, 0x1, 0x190) semop(r4, &(0x7f0000001540), 0x0) socket(0x10, 0x3, 0xa) rmdir(&(0x7f0000001500)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)}, 0x0) 06:48:34 executing program 5: prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/loop-control\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) io_setup(0x0, &(0x7f00000005c0)) io_cancel(0x0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000600)}, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) listxattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/28, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) getresgid(&(0x7f00000004c0), &(0x7f0000000180), &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) getegid() getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) getegid() getgroups(0x0, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000840)="428055a0b2878769ef69dc00d9868441ff0f1837373addc422d50b20c1906986fbd9f28f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042aff4333358b70647ff745c1e1f7f") 06:48:34 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r1, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x0, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000480)=""/4096, 0x1000, 0x0, &(0x7f0000001480)={0x1a, 0x0, 0x1, 0x2, 0x1, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r2 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000001580)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x12) r4 = semget$private(0x0, 0x1, 0x190) semop(r4, &(0x7f0000001540), 0x0) socket(0x10, 0x3, 0xa) rmdir(&(0x7f0000001500)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)}, 0x0) 06:48:34 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r1, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x0, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000480)=""/4096, 0x1000, 0x0, &(0x7f0000001480)={0x1a, 0x0, 0x1, 0x2, 0x1, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r2 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000001580)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x12) r4 = semget$private(0x0, 0x1, 0x190) semop(r4, &(0x7f0000001540), 0x0) socket(0x10, 0x3, 0xa) rmdir(&(0x7f0000001500)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)}, 0x0) 06:48:34 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000280)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='tunl0\x00'}) syz_execute_func(&(0x7f0000000680)="42805da051c48215b6250a0000000595c3300dc4218812ccc39fe0f58e7e0cc4e3c5687800d3a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") getrusage(0x0, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000000)) sysinfo(&(0x7f0000000140)=""/245) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3845c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@empty, @multicast2}, &(0x7f0000000300)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@empty, @broadcast}, &(0x7f0000000500)=0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={0xffffffffffffffff, &(0x7f0000000540)}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @rand_addr}, &(0x7f0000000a40)=0x4c) 06:48:34 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r1, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x0, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="6367726f757032007228bd0805723570aa0af79485aca52dc2d78e6e0837a4c041ed7c4ed979d62a636345c892647189e19fdeb2fe4e69daadbcac4a7636a3b430a7d3a0c4c3e87e72897a3bc7d8433e71d47d67c4b69dcdac061c950ce7d99bbb01fa08b4a4d7d5a5f9a00000000000eb7d40657c0e23aaecd4a17a4b9138c39f48eec31910b05395b9253ea42e79f28dada69e7b65663f7a6ca32edaa331aee72587e77d80b63ce88f8930056ca6b83a7880b6b2725f6a0636a71d1246fc9dfa824920e8ca9bf743e92534eb88a4ad356359a354b01a04db0b3c7a5d74fe2d495eaae8a5b8bf17b6af014f802926257a932c3e620d2ca8658c8f9a79aee239baa4e9912ccbe50da0a9382ca53a5c5ee79bd17b533c9bc22333465eccde63b67890753aeebb746ac693e5c5bb3abb4c7568bd98cb5b82ce90a954d7", 0x0, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000480)=""/4096, 0x1000, 0x0, &(0x7f0000001480)={0x1a, 0x0, 0x1, 0x2, 0x1, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r2 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000001580)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x12) r4 = semget$private(0x0, 0x1, 0x190) semop(r4, &(0x7f0000001540), 0x0) socket(0x10, 0x3, 0xa) rmdir(&(0x7f0000001500)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)}, 0x0) 06:48:34 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r1, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x0, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="6367726f757032007228bd0805723570aa0af79485aca52dc2d78e6e0837a4c041ed7c4ed979d62a636345c892647189e19fdeb2fe4e69daadbcac4a7636a3b430a7d3a0c4c3e87e72897a3bc7d8433e71d47d67c4b69dcdac061c950ce7d99bbb01fa08b4a4d7d5a5f9a00000000000eb7d40657c0e23aaecd4a17a4b9138c39f48eec31910b05395b9253ea42e79f28dada69e7b65663f7a6ca32edaa331aee72587e77d80b63ce88f8930056ca6b83a7880b6b2725f6a0636a71d1246fc9dfa824920e8ca9bf743e92534eb88a4ad356359a354b01a04db0b3c7a5d74fe2d495eaae8a5b8bf17b6af014f802926257a932c3e620d2ca8658c8f9a79aee239baa4e9912ccbe50da0a9382ca53a5c5ee79bd17b533c9bc22333465eccde63b67890753aeebb746ac693e5c5bb3abb4c7568bd98cb5b82ce90a954d7", 0x0, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000480)=""/4096, 0x1000, 0x0, &(0x7f0000001480)={0x1a, 0x0, 0x1, 0x2, 0x1, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r2 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000001580)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x12) r4 = semget$private(0x0, 0x1, 0x190) semop(r4, &(0x7f0000001540), 0x0) socket(0x10, 0x3, 0xa) rmdir(&(0x7f0000001500)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)}, 0x0) 06:48:34 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r1, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x0, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000480)=""/4096, 0x1000, 0x0, &(0x7f0000001480)={0x1a, 0x0, 0x1, 0x2, 0x1, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r2 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000001580)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x12) r4 = semget$private(0x0, 0x1, 0x190) semop(r4, &(0x7f0000001540), 0x0) socket(0x10, 0x3, 0xa) rmdir(&(0x7f0000001500)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)}, 0x0) 06:48:34 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r1, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x0, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000480)=""/4096, 0x1000, 0x0, &(0x7f0000001480)={0x1a, 0x0, 0x1, 0x2, 0x1, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r2 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000001580)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x12) r4 = semget$private(0x0, 0x1, 0x190) semop(r4, &(0x7f0000001540), 0x0) socket(0x10, 0x3, 0xa) rmdir(&(0x7f0000001500)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)}, 0x0) 06:48:34 executing program 2: clock_gettime(0x0, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f00000004c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)) pipe(&(0x7f00000004c0)) openat$vhci(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vhci\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f00000006c0)='/dev/midi#\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000740)=0xffffffffffffff76) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000400), 0x0, 0x0, 0xfffffffffffffffd) keyctl$assume_authority(0x10, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) sched_setscheduler(0x0, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000540)="f9428055a0b4b48768ef61dc69c0d9d9008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") socket$inet6_udp(0xa, 0x2, 0x0) accept(0xffffffffffffffff, &(0x7f0000000600)=@ethernet={0x0, @remote}, &(0x7f0000000240)=0x80) syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) pipe2(&(0x7f0000000340), 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f00000004c0), 0x1601, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) syz_open_procfs(0x0, &(0x7f0000000240)='auxv\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x10000006, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@local, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") syncfs(0xffffffffffffffff) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000800)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000200)}}}) 06:48:35 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) keyctl$invalidate(0x15, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=""/116, &(0x7f0000000280)=0x74) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000000)) getpid() syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_cache\x00') setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 06:48:35 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r1, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x0, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="6367726f757032007228bd0805723570aa0af79485aca52dc2d78e6e0837a4c041ed7c4ed979d62a636345c892647189e19fdeb2fe4e69daadbcac4a7636a3b430a7d3a0c4c3e87e72897a3bc7d8433e71d47d67c4b69dcdac061c950ce7d99bbb01fa08b4a4d7d5a5f9a00000000000eb7d40657c0e23aaecd4a17a4b9138c39f48eec31910b05395b9253ea42e79f28dada69e7b65663f7a6ca32edaa331aee72587e77d80b63ce88f8930056ca6b83a7880b6b2725f6a0636a71d1246fc9dfa824920e8ca9bf743e92534eb88a4ad356359a354b01a04db0b3c7a5d74fe2d495eaae8a5b8bf17b6af014f802926257a932c3e620d2ca8658c8f9a79aee239baa4e9912ccbe50da0a9382ca53a5c5ee79bd17b533c9bc22333465eccde63b67890753aeebb746ac693e5c5bb3abb4c7568bd98cb5b82ce90a954d7", 0x0, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000480)=""/4096, 0x1000, 0x0, &(0x7f0000001480)={0x1a, 0x0, 0x1, 0x2, 0x1, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r2 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000001580)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x12) r4 = semget$private(0x0, 0x1, 0x190) semop(r4, &(0x7f0000001540), 0x0) socket(0x10, 0x3, 0xa) rmdir(&(0x7f0000001500)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)}, 0x0) 06:48:35 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r1, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x0, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000480)=""/4096, 0x1000, 0x0, &(0x7f0000001480)={0x1a, 0x0, 0x1, 0x2, 0x1, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r2 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000001580)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x12) r4 = semget$private(0x0, 0x1, 0x190) semop(r4, &(0x7f0000001540), 0x0) socket(0x10, 0x3, 0xa) rmdir(&(0x7f0000001500)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)}, 0x0) 06:48:35 executing program 5: capset(&(0x7f0000001000)={0x19980330}, &(0x7f0000001040)) prctl$intptr(0x26, 0x1) mknod(&(0x7f0000000040)='./bus\x00', 0xffe, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000200), &(0x7f0000000100)) [ 230.483045] capability: warning: `syz-executor5' uses 32-bit capabilities (legacy support in use) 06:48:35 executing program 4: mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ff8000/0x1000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) userfaultfd(0x0) timerfd_create(0x0, 0x0) syz_execute_func(&(0x7f0000000040)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000140), 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240), 0xc) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 06:48:35 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000280)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='tunl0\x00'}) syz_execute_func(&(0x7f0000000680)="42805da051c48215b6250a0000000595c3300dc4218812ccc39fe0f58e7e0cc4e3c5687800d3a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") getrusage(0x0, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000000)) sysinfo(&(0x7f0000000140)=""/245) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3845c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@empty, @multicast2}, &(0x7f0000000300)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@empty, @broadcast}, &(0x7f0000000500)=0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={0xffffffffffffffff, &(0x7f0000000540)}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @rand_addr}, &(0x7f0000000a40)=0x4c) 06:48:35 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r1, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x0, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="6367726f757032007228bd0805723570aa0af79485aca52dc2d78e6e0837a4c041ed7c4ed979d62a636345c892647189e19fdeb2fe4e69daadbcac4a7636a3b430a7d3a0c4c3e87e72897a3bc7d8433e71d47d67c4b69dcdac061c950ce7d99bbb01fa08b4a4d7d5a5f9a00000000000eb7d40657c0e23aaecd4a17a4b9138c39f48eec31910b05395b9253ea42e79f28dada69e7b65663f7a6ca32edaa331aee72587e77d80b63ce88f8930056ca6b83a7880b6b2725f6a0636a71d1246fc9dfa824920e8ca9bf743e92534eb88a4ad356359a354b01a04db0b3c7a5d74fe2d495eaae8a5b8bf17b6af014f802926257a932c3e620d2ca8658c8f9a79aee239baa4e9912ccbe50da0a9382ca53a5c5ee79bd17b533c9bc22333465eccde63b67890753aeebb746ac693e5c5bb3abb4c7568bd98cb5b82ce90a954d7", 0x0, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000480)=""/4096, 0x1000, 0x0, &(0x7f0000001480)={0x1a, 0x0, 0x1, 0x2, 0x1, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r2 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000001580)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x12) r4 = semget$private(0x0, 0x1, 0x190) semop(r4, &(0x7f0000001540), 0x0) socket(0x10, 0x3, 0xa) rmdir(&(0x7f0000001500)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)}, 0x0) 06:48:35 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r1, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x0, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000440)) mount(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000480)=""/4096, 0x1000, 0x0, &(0x7f0000001480)={0x1a, 0x0, 0x1, 0x2, 0x1, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r2 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000001580)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x12) r4 = semget$private(0x0, 0x1, 0x190) semop(r4, &(0x7f0000001540), 0x0) socket(0x10, 0x3, 0xa) rmdir(&(0x7f0000001500)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)}, 0x0) 06:48:35 executing program 0: getitimer(0x0, &(0x7f0000000300)) getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) io_setup(0x0, 0xfffffffffffffffe) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) pipe(&(0x7f0000000000)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 06:48:35 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) keyctl$invalidate(0x15, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=""/116, &(0x7f0000000280)=0x74) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000000)) getpid() syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_cache\x00') setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") 06:48:35 executing program 2: clock_gettime(0x0, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f00000004c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000440)) pipe(&(0x7f00000004c0)) openat$vhci(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vhci\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f00000006c0)='/dev/midi#\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000740)=0xffffffffffffff76) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000400), 0x0, 0x0, 0xfffffffffffffffd) keyctl$assume_authority(0x10, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) sched_setscheduler(0x0, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000540)="f9428055a0b4b48768ef61dc69c0d9d9008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") socket$inet6_udp(0xa, 0x2, 0x0) accept(0xffffffffffffffff, &(0x7f0000000600)=@ethernet={0x0, @remote}, &(0x7f0000000240)=0x80) syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) pipe2(&(0x7f0000000340), 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f00000004c0), 0x1601, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) syz_open_procfs(0x0, &(0x7f0000000240)='auxv\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x10000006, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@local, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") syncfs(0xffffffffffffffff) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000800)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000200)}}}) 06:48:36 executing program 4: mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ff8000/0x1000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) userfaultfd(0x0) timerfd_create(0x0, 0x0) syz_execute_func(&(0x7f0000000040)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000140), 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240), 0xc) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 06:48:36 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000280)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)='tunl0\x00'}) syz_execute_func(&(0x7f0000000680)="42805da051c48215b6250a0000000595c3300dc4218812ccc39fe0f58e7e0cc4e3c5687800d3a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") getrusage(0x0, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000000)) sysinfo(&(0x7f0000000140)=""/245) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3845c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@empty, @multicast2}, &(0x7f0000000300)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@empty, @broadcast}, &(0x7f0000000500)=0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={0xffffffffffffffff, &(0x7f0000000540)}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)={@empty, @rand_addr}, &(0x7f0000000a40)=0x4c) 06:48:36 executing program 5: capset(&(0x7f0000001000)={0x19980330}, &(0x7f0000001040)) prctl$intptr(0x26, 0x1) mknod(&(0x7f0000000040)='./bus\x00', 0xffe, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000200), &(0x7f0000000100)) 06:48:36 executing program 5: capset(&(0x7f0000001000)={0x19980330}, &(0x7f0000001040)) prctl$intptr(0x26, 0x1) mknod(&(0x7f0000000040)='./bus\x00', 0xffe, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000200), &(0x7f0000000100)) 06:48:36 executing program 0: getitimer(0x0, &(0x7f0000000300)) getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) io_setup(0x0, 0xfffffffffffffffe) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) pipe(&(0x7f0000000000)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 06:48:36 executing program 3: r0 = memfd_create(&(0x7f000088f000)='b\n\x00\x00\x00', 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x5011, r0, 0x0) ftruncate(r0, 0x0) 06:48:36 executing program 3: r0 = memfd_create(&(0x7f000088f000)='b\n\x00\x00\x00', 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x5011, r0, 0x0) ftruncate(r0, 0x0) 06:48:37 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00\x00\x00', 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x5011, r0, 0x0) ftruncate(r0, 0x0) 06:48:37 executing program 4: mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ff8000/0x1000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) userfaultfd(0x0) timerfd_create(0x0, 0x0) syz_execute_func(&(0x7f0000000040)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000140), 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240), 0xc) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 06:48:37 executing program 1: clock_gettime(0x5, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004040)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:37 executing program 3: r0 = memfd_create(&(0x7f000088f000)='b\n\x00\x00\x00', 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x5011, r0, 0x0) ftruncate(r0, 0x0) 06:48:37 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00\x00\x00', 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x5011, r0, 0x0) ftruncate(r0, 0x0) 06:48:37 executing program 5: capset(&(0x7f0000001000)={0x19980330}, &(0x7f0000001040)) prctl$intptr(0x26, 0x1) mknod(&(0x7f0000000040)='./bus\x00', 0xffe, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000200), &(0x7f0000000100)) 06:48:37 executing program 3: r0 = memfd_create(&(0x7f000088f000)='b\n\x00\x00\x00', 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x5011, r0, 0x0) ftruncate(r0, 0x0) 06:48:37 executing program 3: semget(0x1, 0x0, 0x0) semop(0x0, &(0x7f0000000280), 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)="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", 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setitimer(0x0, &(0x7f0000000080), &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10) setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x2710}}, &(0x7f0000000140)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)=0x4) inotify_rm_watch(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) 06:48:37 executing program 5: keyctl$set_reqkey_keyring(0x4, 0xfffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9ce41ff0f1837370f0fdaaac4c19086d9f28fc9410feefa4e2179fbe5e5c4c1e16a9901725e45c4010d64ac1e5d31a3b706e2989f3b690b5241") signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000340)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000240)) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000005dc0)) eventfd(0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000005e40)={0xa, 0x0, 0x0, @dev}, &(0x7f0000005e80)=0x1c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006280)={{{@in=@remote, @in=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000006380)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006400)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000063c0)='-nodevmime_typekeyring\x00'}, 0x30) lstat(&(0x7f0000006440)='./file0\x00', &(0x7f0000006480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006500)) getresuid(&(0x7f0000006540), &(0x7f0000006580), &(0x7f00000065c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000080c0)) getresuid(&(0x7f0000008100), &(0x7f0000008140), &(0x7f0000008180)) gettid() lstat(&(0x7f00000081c0)='./file0\x00', &(0x7f0000008200)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008280)={{{@in=@remote, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000008380)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000008540)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000099c0), &(0x7f0000009a00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009a40)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000009b40)=0xe8) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009b80)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast1}}}, &(0x7f0000009c80)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000009cc0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000009e40), 0x0, 0x0) getpid() syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 06:48:37 executing program 0: getitimer(0x0, &(0x7f0000000300)) getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) io_setup(0x0, 0xfffffffffffffffe) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) pipe(&(0x7f0000000000)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 06:48:37 executing program 5: keyctl$set_reqkey_keyring(0x4, 0xfffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9ce41ff0f1837370f0fdaaac4c19086d9f28fc9410feefa4e2179fbe5e5c4c1e16a9901725e45c4010d64ac1e5d31a3b706e2989f3b690b5241") signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000340)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000240)) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000005dc0)) eventfd(0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000005e40)={0xa, 0x0, 0x0, @dev}, &(0x7f0000005e80)=0x1c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006280)={{{@in=@remote, @in=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000006380)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006400)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000063c0)='-nodevmime_typekeyring\x00'}, 0x30) lstat(&(0x7f0000006440)='./file0\x00', &(0x7f0000006480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006500)) getresuid(&(0x7f0000006540), &(0x7f0000006580), &(0x7f00000065c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000080c0)) getresuid(&(0x7f0000008100), &(0x7f0000008140), &(0x7f0000008180)) gettid() lstat(&(0x7f00000081c0)='./file0\x00', &(0x7f0000008200)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008280)={{{@in=@remote, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000008380)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000008540)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000099c0), &(0x7f0000009a00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009a40)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000009b40)=0xe8) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009b80)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast1}}}, &(0x7f0000009c80)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000009cc0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000009e40), 0x0, 0x0) getpid() syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 06:48:37 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00\x00\x00', 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x5011, r0, 0x0) ftruncate(r0, 0x0) 06:48:37 executing program 5: keyctl$set_reqkey_keyring(0x4, 0xfffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9ce41ff0f1837370f0fdaaac4c19086d9f28fc9410feefa4e2179fbe5e5c4c1e16a9901725e45c4010d64ac1e5d31a3b706e2989f3b690b5241") signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000340)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000240)) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000005dc0)) eventfd(0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000005e40)={0xa, 0x0, 0x0, @dev}, &(0x7f0000005e80)=0x1c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006280)={{{@in=@remote, @in=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000006380)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006400)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000063c0)='-nodevmime_typekeyring\x00'}, 0x30) lstat(&(0x7f0000006440)='./file0\x00', &(0x7f0000006480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006500)) getresuid(&(0x7f0000006540), &(0x7f0000006580), &(0x7f00000065c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000080c0)) getresuid(&(0x7f0000008100), &(0x7f0000008140), &(0x7f0000008180)) gettid() lstat(&(0x7f00000081c0)='./file0\x00', &(0x7f0000008200)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008280)={{{@in=@remote, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000008380)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000008540)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000099c0), &(0x7f0000009a00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009a40)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000009b40)=0xe8) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009b80)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast1}}}, &(0x7f0000009c80)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000009cc0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000009e40), 0x0, 0x0) getpid() syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 06:48:38 executing program 4: mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ff8000/0x1000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) userfaultfd(0x0) timerfd_create(0x0, 0x0) syz_execute_func(&(0x7f0000000040)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000140), 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240), 0xc) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 06:48:38 executing program 1: clock_gettime(0x5, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004040)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:38 executing program 5: keyctl$set_reqkey_keyring(0x4, 0xfffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9ce41ff0f1837370f0fdaaac4c19086d9f28fc9410feefa4e2179fbe5e5c4c1e16a9901725e45c4010d64ac1e5d31a3b706e2989f3b690b5241") signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000340)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000240)) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000005dc0)) eventfd(0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000005e40)={0xa, 0x0, 0x0, @dev}, &(0x7f0000005e80)=0x1c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006280)={{{@in=@remote, @in=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000006380)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006400)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000063c0)='-nodevmime_typekeyring\x00'}, 0x30) lstat(&(0x7f0000006440)='./file0\x00', &(0x7f0000006480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006500)) getresuid(&(0x7f0000006540), &(0x7f0000006580), &(0x7f00000065c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000080c0)) getresuid(&(0x7f0000008100), &(0x7f0000008140), &(0x7f0000008180)) gettid() lstat(&(0x7f00000081c0)='./file0\x00', &(0x7f0000008200)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008280)={{{@in=@remote, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000008380)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000008540)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000099c0), &(0x7f0000009a00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009a40)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000009b40)=0xe8) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009b80)={{{@in6=@remote, @in=@multicast1}}, {{@in=@multicast1}}}, &(0x7f0000009c80)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000009cc0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000009e40), 0x0, 0x0) getpid() syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 06:48:38 executing program 2: socket$inet6_icmp_raw(0x2, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000004c0)={0x1b2, &(0x7f0000000480)}, 0x10) clock_gettime(0x0, &(0x7f0000000200)) syz_open_dev$midi(&(0x7f0000000480)='/dev/midi#\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000005c0), &(0x7f00000009c0), 0x0, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f0000000180), &(0x7f0000000300), 0x0, 0x0) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000a80)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000900), &(0x7f0000000940)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000980), 0x8) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000ac0)) add_key$user(&(0x7f0000688000)='user\x00', &(0x7f0000000140), &(0x7f00000007c0), 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000840)={@local}, &(0x7f0000000880)=0x14) request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000000340), &(0x7f00000002c0)="2f6465612f7675746f66730719", 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x10) keyctl$dh_compute(0x17, &(0x7f00004c8ff4), &(0x7f0000000040), 0x16a, &(0x7f0000000000)={&(0x7f0000bf4ff3)={'crc32-generic\x00'}, &(0x7f0000000000)}) fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getgroups(0x0, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="1cd2805da0616969692295d3200f01eece41ff0f0f1bc2370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 06:48:38 executing program 3: semget(0x1, 0x0, 0x0) semop(0x0, &(0x7f0000000280), 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)="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", 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setitimer(0x0, &(0x7f0000000080), &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10) setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x2710}}, &(0x7f0000000140)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)=0x4) inotify_rm_watch(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) 06:48:38 executing program 0: getitimer(0x0, &(0x7f0000000300)) getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) io_setup(0x0, 0xfffffffffffffffe) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) pipe(&(0x7f0000000000)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 06:48:38 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000380)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000001500)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280), &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000340)={0x0, @dev, 0x0, 0x0, 'lblcr\x00'}, 0x2c) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$urandom(0xffffffffffffff9c, &(0x7f0000001540)='/dev/urandom\x00', 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000003c0)=""/4096, 0x1000}, 0x120) [ 234.060823] audit: type=1326 audit(1537253318.774:2): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8348 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:48:39 executing program 4: getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000007c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 06:48:39 executing program 1: clock_gettime(0x5, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004040)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:39 executing program 2: socket$inet6_icmp_raw(0x2, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000004c0)={0x1b2, &(0x7f0000000480)}, 0x10) clock_gettime(0x0, &(0x7f0000000200)) syz_open_dev$midi(&(0x7f0000000480)='/dev/midi#\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000005c0), &(0x7f00000009c0), 0x0, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f0000000180), &(0x7f0000000300), 0x0, 0x0) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000a80)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000900), &(0x7f0000000940)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000980), 0x8) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000ac0)) add_key$user(&(0x7f0000688000)='user\x00', &(0x7f0000000140), &(0x7f00000007c0), 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000840)={@local}, &(0x7f0000000880)=0x14) request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000000340), &(0x7f00000002c0)="2f6465612f7675746f66730719", 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x10) keyctl$dh_compute(0x17, &(0x7f00004c8ff4), &(0x7f0000000040), 0x16a, &(0x7f0000000000)={&(0x7f0000bf4ff3)={'crc32-generic\x00'}, &(0x7f0000000000)}) fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getgroups(0x0, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="1cd2805da0616969692295d3200f01eece41ff0f0f1bc2370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 06:48:39 executing program 3: semget(0x1, 0x0, 0x0) semop(0x0, &(0x7f0000000280), 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)="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", 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setitimer(0x0, &(0x7f0000000080), &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10) setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x2710}}, &(0x7f0000000140)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)=0x4) inotify_rm_watch(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) 06:48:39 executing program 4: getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000007c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 06:48:39 executing program 0: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000400)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000006c0), 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) connect(0xffffffffffffffff, &(0x7f0000000340)=@xdp, 0xfffffffffffffebf) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f00000007c0)='./file0\x00') inotify_init1(0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000240)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) [ 234.859755] audit: type=1326 audit(1537253319.574:3): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8348 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:48:39 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000380)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000001500)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280), &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000340)={0x0, @dev, 0x0, 0x0, 'lblcr\x00'}, 0x2c) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$urandom(0xffffffffffffff9c, &(0x7f0000001540)='/dev/urandom\x00', 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000003c0)=""/4096, 0x1000}, 0x120) 06:48:40 executing program 4: getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000007c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 06:48:40 executing program 1: clock_gettime(0x5, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) getgroups(0x0, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002400)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004040)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004140)=0xe8) getgid() stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:40 executing program 3: semget(0x1, 0x0, 0x0) semop(0x0, &(0x7f0000000280), 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)="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", 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setitimer(0x0, &(0x7f0000000080), &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10) setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x2710}}, &(0x7f0000000140)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)=0x4) inotify_rm_watch(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) 06:48:40 executing program 2: socket$inet6_icmp_raw(0x2, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000004c0)={0x1b2, &(0x7f0000000480)}, 0x10) clock_gettime(0x0, &(0x7f0000000200)) syz_open_dev$midi(&(0x7f0000000480)='/dev/midi#\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000005c0), &(0x7f00000009c0), 0x0, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f0000000180), &(0x7f0000000300), 0x0, 0x0) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000a80)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000900), &(0x7f0000000940)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000980), 0x8) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000ac0)) add_key$user(&(0x7f0000688000)='user\x00', &(0x7f0000000140), &(0x7f00000007c0), 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000840)={@local}, &(0x7f0000000880)=0x14) request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000000340), &(0x7f00000002c0)="2f6465612f7675746f66730719", 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x10) keyctl$dh_compute(0x17, &(0x7f00004c8ff4), &(0x7f0000000040), 0x16a, &(0x7f0000000000)={&(0x7f0000bf4ff3)={'crc32-generic\x00'}, &(0x7f0000000000)}) fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getgroups(0x0, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="1cd2805da0616969692295d3200f01eece41ff0f0f1bc2370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") [ 235.534592] audit: type=1326 audit(1537253320.254:4): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8388 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:48:40 executing program 4: getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000007c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 06:48:40 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000380)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000001500)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280), &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000340)={0x0, @dev, 0x0, 0x0, 'lblcr\x00'}, 0x2c) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$urandom(0xffffffffffffff9c, &(0x7f0000001540)='/dev/urandom\x00', 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000003c0)=""/4096, 0x1000}, 0x120) 06:48:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) [ 235.806116] audit: type=1326 audit(1537253320.524:5): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8407 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 235.944806] netlink: 180 bytes leftover after parsing attributes in process `syz-executor4'. [ 235.976158] netlink: 180 bytes leftover after parsing attributes in process `syz-executor4'. 06:48:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) [ 236.137065] netlink: 180 bytes leftover after parsing attributes in process `syz-executor4'. 06:48:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 06:48:41 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000300)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f0000000140), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x20000000, 0x1000000003, 0x2}) recvmmsg(r0, &(0x7f0000005940)=[{{&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000005a00)) [ 236.289975] netlink: 180 bytes leftover after parsing attributes in process `syz-executor4'. 06:48:41 executing program 0: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000400)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000006c0), 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) connect(0xffffffffffffffff, &(0x7f0000000340)=@xdp, 0xfffffffffffffebf) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f00000007c0)='./file0\x00') inotify_init1(0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000240)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) 06:48:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 06:48:41 executing program 3: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000400)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000006c0), 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) connect(0xffffffffffffffff, &(0x7f0000000340)=@xdp, 0xfffffffffffffebf) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f00000007c0)='./file0\x00') inotify_init1(0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000240)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) 06:48:41 executing program 2: socket$inet6_icmp_raw(0x2, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000004c0)={0x1b2, &(0x7f0000000480)}, 0x10) clock_gettime(0x0, &(0x7f0000000200)) syz_open_dev$midi(&(0x7f0000000480)='/dev/midi#\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000005c0), &(0x7f00000009c0), 0x0, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f0000000180), &(0x7f0000000300), 0x0, 0x0) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000a80)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000900), &(0x7f0000000940)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000980), 0x8) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000ac0)) add_key$user(&(0x7f0000688000)='user\x00', &(0x7f0000000140), &(0x7f00000007c0), 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000840)={@local}, &(0x7f0000000880)=0x14) request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000000340), &(0x7f00000002c0)="2f6465612f7675746f66730719", 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x10) keyctl$dh_compute(0x17, &(0x7f00004c8ff4), &(0x7f0000000040), 0x16a, &(0x7f0000000000)={&(0x7f0000bf4ff3)={'crc32-generic\x00'}, &(0x7f0000000000)}) fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getgroups(0x0, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="1cd2805da0616969692295d3200f01eece41ff0f0f1bc2370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 06:48:41 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000300)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f0000000140), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x20000000, 0x1000000003, 0x2}) recvmmsg(r0, &(0x7f0000005940)=[{{&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000005a00)) [ 236.522240] netlink: 180 bytes leftover after parsing attributes in process `syz-executor4'. 06:48:41 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000380)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000001500)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280), &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000340)={0x0, @dev, 0x0, 0x0, 'lblcr\x00'}, 0x2c) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$urandom(0xffffffffffffff9c, &(0x7f0000001540)='/dev/urandom\x00', 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000003c0)=""/4096, 0x1000}, 0x120) 06:48:41 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000300)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f0000000140), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x20000000, 0x1000000003, 0x2}) recvmmsg(r0, &(0x7f0000005940)=[{{&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000005a00)) 06:48:41 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000300)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f0000000140), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x20000000, 0x1000000003, 0x2}) recvmmsg(r0, &(0x7f0000005940)=[{{&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000005a00)) [ 236.794029] audit: type=1326 audit(1537253321.514:6): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8452 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 06:48:41 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r1) 06:48:41 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r1) 06:48:41 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r1) 06:48:42 executing program 0: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000400)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000006c0), 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) connect(0xffffffffffffffff, &(0x7f0000000340)=@xdp, 0xfffffffffffffebf) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f00000007c0)='./file0\x00') inotify_init1(0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000240)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) 06:48:42 executing program 3: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000400)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000006c0), 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) connect(0xffffffffffffffff, &(0x7f0000000340)=@xdp, 0xfffffffffffffebf) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f00000007c0)='./file0\x00') inotify_init1(0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000240)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) 06:48:42 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = dup(r0) lseek(r1, 0xfffffffffffffffe, 0x0) 06:48:42 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r1) 06:48:42 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = dup(r0) lseek(r1, 0xfffffffffffffffe, 0x0) 06:48:42 executing program 5: socket$unix(0x1, 0x3, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f00000000c0)=0x6e, 0x0) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) getpgrp(0x0) getuid() getgroups(0x0, &(0x7f0000001a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001a40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001a80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001c80)={{{@in=@loopback, @in=@remote}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000001d80)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000001dc0)) inotify_init() accept$unix(0xffffffffffffff9c, &(0x7f0000001e40)=@abs, &(0x7f0000001ec0)=0x6e) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001f00)=0xffffffffffffffff, 0x4) signalfd(0xffffffffffffff9c, &(0x7f0000001f40), 0x8) socket$inet_tcp(0x2, 0x1, 0x0) getpeername(0xffffffffffffff9c, &(0x7f0000001f80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000002000)=0x80) accept(0xffffffffffffffff, &(0x7f0000002040)=@l2, &(0x7f00000020c0)=0x80) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002100)) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000003640), 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000003680)) socket$key(0xf, 0x3, 0x2) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000037c0)='./file0\x00', &(0x7f0000003800)) getresgid(&(0x7f0000003880), &(0x7f00000038c0), &(0x7f0000003900)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000004f00)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000004f40)='autogroup\x00') bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000005040), 0xc) perf_event_open(&(0x7f0000005080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000005100)='io.max\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000005140)='/dev/input/event#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000005180)='cgroup.subtree_control\x00', 0x2, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 06:48:42 executing program 4: rt_sigpending(&(0x7f0000000040), 0x8) timerfd_create(0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000400)='vmnet1ppp1+.vmnet0\x00', 0x0) syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000840)=@alg, &(0x7f0000000180)=0x80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000003c0), 0xc, &(0x7f0000000600)={&(0x7f00000004c0)=ANY=[]}}, 0x0) add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f00000028c0), 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000003bc0)='user\x00', &(0x7f0000003c00), &(0x7f0000003c40), 0x0, 0x0) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_pts(0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) socket$nl_generic(0x10, 0x3, 0x10) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000300), &(0x7f0000000500)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000540), &(0x7f0000000580)=0x8) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) getpgid(0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000240)="1fa63a5184aecf9bff56e8ba527b0b4e", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 06:48:43 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = dup(r0) lseek(r1, 0xfffffffffffffffe, 0x0) 06:48:43 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @remote}}}, 0x84) 06:48:43 executing program 3: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000400)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000006c0), 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) connect(0xffffffffffffffff, &(0x7f0000000340)=@xdp, 0xfffffffffffffebf) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f00000007c0)='./file0\x00') inotify_init1(0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000240)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) 06:48:43 executing program 0: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000400)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000006c0), 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) connect(0xffffffffffffffff, &(0x7f0000000340)=@xdp, 0xfffffffffffffebf) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f00000007c0)='./file0\x00') inotify_init1(0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000240)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) 06:48:43 executing program 4: rt_sigpending(&(0x7f0000000040), 0x8) timerfd_create(0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000400)='vmnet1ppp1+.vmnet0\x00', 0x0) syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000840)=@alg, &(0x7f0000000180)=0x80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000003c0), 0xc, &(0x7f0000000600)={&(0x7f00000004c0)=ANY=[]}}, 0x0) add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f00000028c0), 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000003bc0)='user\x00', &(0x7f0000003c00), &(0x7f0000003c40), 0x0, 0x0) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_pts(0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) socket$nl_generic(0x10, 0x3, 0x10) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000300), &(0x7f0000000500)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000540), &(0x7f0000000580)=0x8) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) getpgid(0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000240)="1fa63a5184aecf9bff56e8ba527b0b4e", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 06:48:43 executing program 5: socket$unix(0x1, 0x3, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f00000000c0)=0x6e, 0x0) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) getpgrp(0x0) getuid() getgroups(0x0, &(0x7f0000001a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001a40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001a80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001c80)={{{@in=@loopback, @in=@remote}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000001d80)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000001dc0)) inotify_init() accept$unix(0xffffffffffffff9c, &(0x7f0000001e40)=@abs, &(0x7f0000001ec0)=0x6e) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001f00)=0xffffffffffffffff, 0x4) signalfd(0xffffffffffffff9c, &(0x7f0000001f40), 0x8) socket$inet_tcp(0x2, 0x1, 0x0) getpeername(0xffffffffffffff9c, &(0x7f0000001f80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000002000)=0x80) accept(0xffffffffffffffff, &(0x7f0000002040)=@l2, &(0x7f00000020c0)=0x80) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002100)) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000003640), 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000003680)) socket$key(0xf, 0x3, 0x2) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000037c0)='./file0\x00', &(0x7f0000003800)) getresgid(&(0x7f0000003880), &(0x7f00000038c0), &(0x7f0000003900)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000004f00)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000004f40)='autogroup\x00') bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000005040), 0xc) perf_event_open(&(0x7f0000005080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000005100)='io.max\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000005140)='/dev/input/event#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000005180)='cgroup.subtree_control\x00', 0x2, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 06:48:43 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @remote}}}, 0x84) 06:48:43 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = dup(r0) lseek(r1, 0xfffffffffffffffe, 0x0) 06:48:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @remote}}}, 0x84) 06:48:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'team_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000004300)={&(0x7f0000000180), 0xc, &(0x7f00000042c0)={&(0x7f0000000b40)=@newlink={0x38, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4, 0x5}}}]}, 0x38}}, 0x0) 06:48:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @remote}}}, 0x84) 06:48:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'team_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000004300)={&(0x7f0000000180), 0xc, &(0x7f00000042c0)={&(0x7f0000000b40)=@newlink={0x38, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4, 0x5}}}]}, 0x38}}, 0x0) 06:48:44 executing program 1: prctl$seccomp(0x23, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000005c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000380)) ioperm(0x0, 0x0, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) chroot(&(0x7f0000000300)='./file0\x00') munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) geteuid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x0, &(0x7f00000003c0), &(0x7f00000000c0)) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000480)={'broute\x00'}, &(0x7f0000000500)=0x78) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000000540)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002c80)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) getgroups(0x0, &(0x7f0000002d40)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003580)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000003540)='broute\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003680)) getresgid(&(0x7f0000008940), &(0x7f0000003700), &(0x7f0000003740)) getpid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003780)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000040c0)) getresgid(&(0x7f0000004100), &(0x7f0000004140), &(0x7f0000004180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000041c0), &(0x7f0000004200)=0xc) getresgid(&(0x7f0000004240), &(0x7f0000004280), &(0x7f00000042c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004300)) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004340)) fstat(0xffffffffffffffff, &(0x7f0000004380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006700)) getegid() getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000006740), &(0x7f0000006780), &(0x7f00000067c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006c00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006bc0)='\x00', 0xffffffffffffffff}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000006c40)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000006cc0)) getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000008180), &(0x7f00000081c0), &(0x7f0000008200)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000008240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008280), &(0x7f00000082c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000008540)) getgroups(0x0, &(0x7f0000008580)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000085c0)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008700), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_execute_func(&(0x7f0000000240)="360f72f1ff6969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 06:48:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'team_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000004300)={&(0x7f0000000180), 0xc, &(0x7f00000042c0)={&(0x7f0000000b40)=@newlink={0x38, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4, 0x5}}}]}, 0x38}}, 0x0) 06:48:44 executing program 1: prctl$seccomp(0x23, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000005c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000380)) ioperm(0x0, 0x0, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) chroot(&(0x7f0000000300)='./file0\x00') munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) geteuid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x0, &(0x7f00000003c0), &(0x7f00000000c0)) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000480)={'broute\x00'}, &(0x7f0000000500)=0x78) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000000540)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002c80)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) getgroups(0x0, &(0x7f0000002d40)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003580)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000003540)='broute\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003680)) getresgid(&(0x7f0000008940), &(0x7f0000003700), &(0x7f0000003740)) getpid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003780)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000040c0)) getresgid(&(0x7f0000004100), &(0x7f0000004140), &(0x7f0000004180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000041c0), &(0x7f0000004200)=0xc) getresgid(&(0x7f0000004240), &(0x7f0000004280), &(0x7f00000042c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004300)) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004340)) fstat(0xffffffffffffffff, &(0x7f0000004380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006700)) getegid() getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000006740), &(0x7f0000006780), &(0x7f00000067c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006c00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006bc0)='\x00', 0xffffffffffffffff}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000006c40)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000006cc0)) getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000008180), &(0x7f00000081c0), &(0x7f0000008200)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000008240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008280), &(0x7f00000082c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000008540)) getgroups(0x0, &(0x7f0000008580)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000085c0)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008700), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_execute_func(&(0x7f0000000240)="360f72f1ff6969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 06:48:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'team_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000004300)={&(0x7f0000000180), 0xc, &(0x7f00000042c0)={&(0x7f0000000b40)=@newlink={0x38, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4, 0x5}}}]}, 0x38}}, 0x0) 06:48:44 executing program 4: rt_sigpending(&(0x7f0000000040), 0x8) timerfd_create(0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000400)='vmnet1ppp1+.vmnet0\x00', 0x0) syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000840)=@alg, &(0x7f0000000180)=0x80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000003c0), 0xc, &(0x7f0000000600)={&(0x7f00000004c0)=ANY=[]}}, 0x0) add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f00000028c0), 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000003bc0)='user\x00', &(0x7f0000003c00), &(0x7f0000003c40), 0x0, 0x0) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_pts(0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) socket$nl_generic(0x10, 0x3, 0x10) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000300), &(0x7f0000000500)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000540), &(0x7f0000000580)=0x8) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) getpgid(0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000240)="1fa63a5184aecf9bff56e8ba527b0b4e", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 06:48:44 executing program 5: socket$unix(0x1, 0x3, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f00000000c0)=0x6e, 0x0) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) getpgrp(0x0) getuid() getgroups(0x0, &(0x7f0000001a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001a40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001a80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001c80)={{{@in=@loopback, @in=@remote}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000001d80)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000001dc0)) inotify_init() accept$unix(0xffffffffffffff9c, &(0x7f0000001e40)=@abs, &(0x7f0000001ec0)=0x6e) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001f00)=0xffffffffffffffff, 0x4) signalfd(0xffffffffffffff9c, &(0x7f0000001f40), 0x8) socket$inet_tcp(0x2, 0x1, 0x0) getpeername(0xffffffffffffff9c, &(0x7f0000001f80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000002000)=0x80) accept(0xffffffffffffffff, &(0x7f0000002040)=@l2, &(0x7f00000020c0)=0x80) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002100)) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000003640), 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000003680)) socket$key(0xf, 0x3, 0x2) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000037c0)='./file0\x00', &(0x7f0000003800)) getresgid(&(0x7f0000003880), &(0x7f00000038c0), &(0x7f0000003900)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000004f00)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000004f40)='autogroup\x00') bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000005040), 0xc) perf_event_open(&(0x7f0000005080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000005100)='io.max\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000005140)='/dev/input/event#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000005180)='cgroup.subtree_control\x00', 0x2, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 06:48:44 executing program 3: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) dup(0xffffffffffffff9c) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e40)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f80)={{{@in6, @in=@local}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000017c0)={{{@in6=@remote, @in6}}, {{@in6=@ipv4}, 0x0, @in=@broadcast}}, &(0x7f00000018c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001900)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001a40)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001a80)={@dev}, &(0x7f0000001ac0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001b00)={{{@in=@broadcast, @in6=@local}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000001c00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001d00)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001dc0)={@mcast1}, &(0x7f0000001e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001e40)={@ipv4={[], [], @dev}}, &(0x7f0000001e80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001f00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001f40)={{{@in=@broadcast, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002040)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000020c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002100)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002140)={{{@in6, @in=@local}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002240)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000022c0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000026c0)={0x0, @rand_addr, @remote}, &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002780)={{{@in=@dev, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000002980)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000029c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{}, 0x0, @in=@local}}, &(0x7f0000002ac0)=0xe8) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002cc0)={&(0x7f0000002b40)=@hci, 0x80, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)=""/92, 0x5c}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002d00)={'syzkaller1\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002d40)={@ipv4}, &(0x7f0000002d80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000002dc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002e40)=0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002e80)={{{@in6, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000002f80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003000)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000003100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003140)=0x14) accept4(0xffffffffffffffff, &(0x7f0000005bc0)=@xdp, &(0x7f0000005c40)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005cc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005d00)={{{@in6, @in6=@dev}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000005e00)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005f00)={0x0, @multicast2, @dev}, &(0x7f0000005f40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006240)={{{@in6, @in6}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000006340)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000006380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000063c0)=0x14, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007180)={&(0x7f00000004c0), 0xc, &(0x7f0000007140)={&(0x7f0000006400)={0x14}, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], &(0x7f00000005c0)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0), &(0x7f0000000900)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380), &(0x7f00000003c0)=0x8) syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000400)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000640)=0x98) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}}, &(0x7f0000000840)=0xb0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58fe4}]}) connect$unix(0xffffffffffffffff, &(0x7f0000000940)=@file={0x0, './file0\x00'}, 0x6e) iopl(0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000580)=0x78) syz_execute_func(&(0x7f0000000b80)="428055a0876969ef69dc00d9f000e8a68f000080a480a420b17b6b07a2a237374f38211ac4e19086d90dba8fc9c90fee0852522179fb38c665f247af0f2e1ac4010d64ac1e5d31a3b706f080240308ca43020fbef5e04b") 06:48:44 executing program 0: mmap(&(0x7f0000007000/0x9000)=nil, 0x9000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x800c0984124, &(0x7f0000007fff)) 06:48:44 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x0, &(0x7f0000000640)) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x0, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x1d, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_LOCK(0x0, 0xb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0626969ef69dc00d9c421a05d2f8a20c4a151d09f00800000c4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000180)) shmget(0xffffffffffffffff, 0x400000, 0x0, &(0x7f0000c00000/0x400000)=nil) memfd_create(&(0x7f0000000040)='/dev/vsock\x00', 0x0) getpgid(0x0) geteuid() write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000340)={0x7}, 0x7) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000002900)) syz_open_dev$ndb(&(0x7f0000000300)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in6=@loopback, @in6}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000002a80)=0xe8) getegid() 06:48:44 executing program 0: mmap(&(0x7f0000007000/0x9000)=nil, 0x9000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x800c0984124, &(0x7f0000007fff)) 06:48:44 executing program 1: prctl$seccomp(0x23, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000005c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000380)) ioperm(0x0, 0x0, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) chroot(&(0x7f0000000300)='./file0\x00') munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) geteuid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x0, &(0x7f00000003c0), &(0x7f00000000c0)) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000480)={'broute\x00'}, &(0x7f0000000500)=0x78) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000000540)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002c80)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) getgroups(0x0, &(0x7f0000002d40)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003580)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000003540)='broute\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003680)) getresgid(&(0x7f0000008940), &(0x7f0000003700), &(0x7f0000003740)) getpid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003780)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000040c0)) getresgid(&(0x7f0000004100), &(0x7f0000004140), &(0x7f0000004180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000041c0), &(0x7f0000004200)=0xc) getresgid(&(0x7f0000004240), &(0x7f0000004280), &(0x7f00000042c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004300)) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004340)) fstat(0xffffffffffffffff, &(0x7f0000004380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006700)) getegid() getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000006740), &(0x7f0000006780), &(0x7f00000067c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006c00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006bc0)='\x00', 0xffffffffffffffff}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000006c40)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000006cc0)) getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000008180), &(0x7f00000081c0), &(0x7f0000008200)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000008240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008280), &(0x7f00000082c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000008540)) getgroups(0x0, &(0x7f0000008580)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000085c0)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008700), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_execute_func(&(0x7f0000000240)="360f72f1ff6969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 06:48:45 executing program 0: mmap(&(0x7f0000007000/0x9000)=nil, 0x9000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x800c0984124, &(0x7f0000007fff)) 06:48:45 executing program 0: mmap(&(0x7f0000007000/0x9000)=nil, 0x9000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x800c0984124, &(0x7f0000007fff)) 06:48:45 executing program 1: prctl$seccomp(0x23, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000005c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000380)) ioperm(0x0, 0x0, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) chroot(&(0x7f0000000300)='./file0\x00') munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) geteuid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x0, &(0x7f00000003c0), &(0x7f00000000c0)) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000280)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000480)={'broute\x00'}, &(0x7f0000000500)=0x78) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000000540)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002c80)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) getgroups(0x0, &(0x7f0000002d40)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003580)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000003540)='broute\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003680)) getresgid(&(0x7f0000008940), &(0x7f0000003700), &(0x7f0000003740)) getpid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003780)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000040c0)) getresgid(&(0x7f0000004100), &(0x7f0000004140), &(0x7f0000004180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000041c0), &(0x7f0000004200)=0xc) getresgid(&(0x7f0000004240), &(0x7f0000004280), &(0x7f00000042c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004300)) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004340)) fstat(0xffffffffffffffff, &(0x7f0000004380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006700)) getegid() getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000006740), &(0x7f0000006780), &(0x7f00000067c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006c00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006bc0)='\x00', 0xffffffffffffffff}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000006c40)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000006cc0)) getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000008180), &(0x7f00000081c0), &(0x7f0000008200)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000008240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008280), &(0x7f00000082c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000008540)) getgroups(0x0, &(0x7f0000008580)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000085c0)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008700), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_execute_func(&(0x7f0000000240)="360f72f1ff6969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 06:48:45 executing program 0: mremap(&(0x7f0000ff2000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000ff0000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000f80)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgroups(0x0, &(0x7f00000009c0)) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f00000000c0)='*/[wlan1\x00', 0xffffffffffffffff) request_key(&(0x7f00000002c0)="7573650500", &(0x7f0000000440), &(0x7f0000000680)='\x00', 0xfffffffffffffff9) keyctl$link(0x8, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) getpgrp(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000004c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xe8) stat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001900)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001940)={{{@in=@dev, @in=@multicast2}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000001ac0), &(0x7f0000001b00)) 06:48:45 executing program 1: setrlimit(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 06:48:45 executing program 4: rt_sigpending(&(0x7f0000000040), 0x8) timerfd_create(0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000400)='vmnet1ppp1+.vmnet0\x00', 0x0) syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000840)=@alg, &(0x7f0000000180)=0x80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000003c0), 0xc, &(0x7f0000000600)={&(0x7f00000004c0)=ANY=[]}}, 0x0) add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f00000028c0), 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000003bc0)='user\x00', &(0x7f0000003c00), &(0x7f0000003c40), 0x0, 0x0) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_pts(0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) socket$nl_generic(0x10, 0x3, 0x10) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000300), &(0x7f0000000500)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000540), &(0x7f0000000580)=0x8) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) getpgid(0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000240)="1fa63a5184aecf9bff56e8ba527b0b4e", 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 06:48:45 executing program 5: socket$unix(0x1, 0x3, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f00000000c0)=0x6e, 0x0) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) getpgrp(0x0) getuid() getgroups(0x0, &(0x7f0000001a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001a40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001a80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001c80)={{{@in=@loopback, @in=@remote}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000001d80)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000001dc0)) inotify_init() accept$unix(0xffffffffffffff9c, &(0x7f0000001e40)=@abs, &(0x7f0000001ec0)=0x6e) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001f00)=0xffffffffffffffff, 0x4) signalfd(0xffffffffffffff9c, &(0x7f0000001f40), 0x8) socket$inet_tcp(0x2, 0x1, 0x0) getpeername(0xffffffffffffff9c, &(0x7f0000001f80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000002000)=0x80) accept(0xffffffffffffffff, &(0x7f0000002040)=@l2, &(0x7f00000020c0)=0x80) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002100)) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000003640), 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000003680)) socket$key(0xf, 0x3, 0x2) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000037c0)='./file0\x00', &(0x7f0000003800)) getresgid(&(0x7f0000003880), &(0x7f00000038c0), &(0x7f0000003900)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000004f00)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000004f40)='autogroup\x00') bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000005040), 0xc) perf_event_open(&(0x7f0000005080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000005100)='io.max\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000005140)='/dev/input/event#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000005180)='cgroup.subtree_control\x00', 0x2, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 06:48:45 executing program 3: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) dup(0xffffffffffffff9c) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e40)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f80)={{{@in6, @in=@local}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000017c0)={{{@in6=@remote, @in6}}, {{@in6=@ipv4}, 0x0, @in=@broadcast}}, &(0x7f00000018c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001900)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001a40)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001a80)={@dev}, &(0x7f0000001ac0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001b00)={{{@in=@broadcast, @in6=@local}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000001c00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001d00)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001dc0)={@mcast1}, &(0x7f0000001e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001e40)={@ipv4={[], [], @dev}}, &(0x7f0000001e80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001f00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001f40)={{{@in=@broadcast, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002040)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000020c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002100)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002140)={{{@in6, @in=@local}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002240)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000022c0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000026c0)={0x0, @rand_addr, @remote}, &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002780)={{{@in=@dev, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000002980)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000029c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{}, 0x0, @in=@local}}, &(0x7f0000002ac0)=0xe8) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002cc0)={&(0x7f0000002b40)=@hci, 0x80, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)=""/92, 0x5c}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002d00)={'syzkaller1\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002d40)={@ipv4}, &(0x7f0000002d80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000002dc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002e40)=0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002e80)={{{@in6, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000002f80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003000)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000003100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003140)=0x14) accept4(0xffffffffffffffff, &(0x7f0000005bc0)=@xdp, &(0x7f0000005c40)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005cc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005d00)={{{@in6, @in6=@dev}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000005e00)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005f00)={0x0, @multicast2, @dev}, &(0x7f0000005f40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006240)={{{@in6, @in6}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000006340)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000006380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000063c0)=0x14, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007180)={&(0x7f00000004c0), 0xc, &(0x7f0000007140)={&(0x7f0000006400)={0x14}, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], &(0x7f00000005c0)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0), &(0x7f0000000900)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380), &(0x7f00000003c0)=0x8) syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000400)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000640)=0x98) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}}, &(0x7f0000000840)=0xb0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58fe4}]}) connect$unix(0xffffffffffffffff, &(0x7f0000000940)=@file={0x0, './file0\x00'}, 0x6e) iopl(0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000580)=0x78) syz_execute_func(&(0x7f0000000b80)="428055a0876969ef69dc00d9f000e8a68f000080a480a420b17b6b07a2a237374f38211ac4e19086d90dba8fc9c90fee0852522179fb38c665f247af0f2e1ac4010d64ac1e5d31a3b706f080240308ca43020fbef5e04b") 06:48:45 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x0, &(0x7f0000000640)) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x0, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x1d, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_LOCK(0x0, 0xb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0626969ef69dc00d9c421a05d2f8a20c4a151d09f00800000c4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000180)) shmget(0xffffffffffffffff, 0x400000, 0x0, &(0x7f0000c00000/0x400000)=nil) memfd_create(&(0x7f0000000040)='/dev/vsock\x00', 0x0) getpgid(0x0) geteuid() write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000340)={0x7}, 0x7) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000002900)) syz_open_dev$ndb(&(0x7f0000000300)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in6=@loopback, @in6}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000002a80)=0xe8) getegid() 06:48:46 executing program 0: mremap(&(0x7f0000ff2000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000ff0000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000f80)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgroups(0x0, &(0x7f00000009c0)) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f00000000c0)='*/[wlan1\x00', 0xffffffffffffffff) request_key(&(0x7f00000002c0)="7573650500", &(0x7f0000000440), &(0x7f0000000680)='\x00', 0xfffffffffffffff9) keyctl$link(0x8, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) getpgrp(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000004c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xe8) stat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001900)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001940)={{{@in=@dev, @in=@multicast2}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000001ac0), &(0x7f0000001b00)) 06:48:46 executing program 1: setrlimit(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 06:48:46 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x0, &(0x7f0000000640)) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x0, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x1d, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_LOCK(0x0, 0xb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0626969ef69dc00d9c421a05d2f8a20c4a151d09f00800000c4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000180)) shmget(0xffffffffffffffff, 0x400000, 0x0, &(0x7f0000c00000/0x400000)=nil) memfd_create(&(0x7f0000000040)='/dev/vsock\x00', 0x0) getpgid(0x0) geteuid() write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000340)={0x7}, 0x7) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000002900)) syz_open_dev$ndb(&(0x7f0000000300)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in6=@loopback, @in6}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000002a80)=0xe8) getegid() 06:48:46 executing program 3: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) dup(0xffffffffffffff9c) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e40)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f80)={{{@in6, @in=@local}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000017c0)={{{@in6=@remote, @in6}}, {{@in6=@ipv4}, 0x0, @in=@broadcast}}, &(0x7f00000018c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001900)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001a40)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001a80)={@dev}, &(0x7f0000001ac0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001b00)={{{@in=@broadcast, @in6=@local}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000001c00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001d00)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001dc0)={@mcast1}, &(0x7f0000001e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001e40)={@ipv4={[], [], @dev}}, &(0x7f0000001e80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001f00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001f40)={{{@in=@broadcast, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002040)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000020c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002100)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002140)={{{@in6, @in=@local}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002240)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000022c0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000026c0)={0x0, @rand_addr, @remote}, &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002780)={{{@in=@dev, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000002980)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000029c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{}, 0x0, @in=@local}}, &(0x7f0000002ac0)=0xe8) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002cc0)={&(0x7f0000002b40)=@hci, 0x80, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)=""/92, 0x5c}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002d00)={'syzkaller1\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002d40)={@ipv4}, &(0x7f0000002d80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000002dc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002e40)=0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002e80)={{{@in6, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000002f80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003000)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000003100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003140)=0x14) accept4(0xffffffffffffffff, &(0x7f0000005bc0)=@xdp, &(0x7f0000005c40)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005cc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005d00)={{{@in6, @in6=@dev}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000005e00)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005f00)={0x0, @multicast2, @dev}, &(0x7f0000005f40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006240)={{{@in6, @in6}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000006340)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000006380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000063c0)=0x14, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007180)={&(0x7f00000004c0), 0xc, &(0x7f0000007140)={&(0x7f0000006400)={0x14}, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], &(0x7f00000005c0)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0), &(0x7f0000000900)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380), &(0x7f00000003c0)=0x8) syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000400)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000640)=0x98) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}}, &(0x7f0000000840)=0xb0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58fe4}]}) connect$unix(0xffffffffffffffff, &(0x7f0000000940)=@file={0x0, './file0\x00'}, 0x6e) iopl(0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000580)=0x78) syz_execute_func(&(0x7f0000000b80)="428055a0876969ef69dc00d9f000e8a68f000080a480a420b17b6b07a2a237374f38211ac4e19086d90dba8fc9c90fee0852522179fb38c665f247af0f2e1ac4010d64ac1e5d31a3b706f080240308ca43020fbef5e04b") 06:48:46 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x0, &(0x7f0000000640)) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x0, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x1d, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_LOCK(0x0, 0xb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0626969ef69dc00d9c421a05d2f8a20c4a151d09f00800000c4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000180)) shmget(0xffffffffffffffff, 0x400000, 0x0, &(0x7f0000c00000/0x400000)=nil) memfd_create(&(0x7f0000000040)='/dev/vsock\x00', 0x0) getpgid(0x0) geteuid() write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000340)={0x7}, 0x7) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000002900)) syz_open_dev$ndb(&(0x7f0000000300)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in6=@loopback, @in6}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000002a80)=0xe8) getegid() 06:48:46 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da06a0f460f46dc0f019e263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf26f042080b660f38302f3e26f043108900000000450f2e628af540d917c4a1ff701c3f04d6adbe90dfe2987e6e") 06:48:47 executing program 0: mremap(&(0x7f0000ff2000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000ff0000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000f80)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgroups(0x0, &(0x7f00000009c0)) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f00000000c0)='*/[wlan1\x00', 0xffffffffffffffff) request_key(&(0x7f00000002c0)="7573650500", &(0x7f0000000440), &(0x7f0000000680)='\x00', 0xfffffffffffffff9) keyctl$link(0x8, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) getpgrp(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000004c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xe8) stat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001900)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001940)={{{@in=@dev, @in=@multicast2}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000001ac0), &(0x7f0000001b00)) 06:48:47 executing program 1: setrlimit(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 06:48:47 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x0, &(0x7f0000000640)) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x0, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x1d, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_LOCK(0x0, 0xb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0626969ef69dc00d9c421a05d2f8a20c4a151d09f00800000c4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000180)) shmget(0xffffffffffffffff, 0x400000, 0x0, &(0x7f0000c00000/0x400000)=nil) memfd_create(&(0x7f0000000040)='/dev/vsock\x00', 0x0) getpgid(0x0) geteuid() write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000340)={0x7}, 0x7) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000002900)) syz_open_dev$ndb(&(0x7f0000000300)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in6=@loopback, @in6}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000002a80)=0xe8) getegid() 06:48:47 executing program 3: iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) dup(0xffffffffffffff9c) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000a00)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e40)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000f40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f80)={{{@in6, @in=@local}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000017c0)={{{@in6=@remote, @in6}}, {{@in6=@ipv4}, 0x0, @in=@broadcast}}, &(0x7f00000018c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001900)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001a40)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001a80)={@dev}, &(0x7f0000001ac0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001b00)={{{@in=@broadcast, @in6=@local}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000001c00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001d00)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001dc0)={@mcast1}, &(0x7f0000001e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001e40)={@ipv4={[], [], @dev}}, &(0x7f0000001e80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001f00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001f40)={{{@in=@broadcast, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002040)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000020c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002100)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002140)={{{@in6, @in=@local}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000002240)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000022c0)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000026c0)={0x0, @rand_addr, @remote}, &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002780)={{{@in=@dev, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000002980)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000029c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{}, 0x0, @in=@local}}, &(0x7f0000002ac0)=0xe8) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002cc0)={&(0x7f0000002b40)=@hci, 0x80, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)=""/92, 0x5c}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002d00)={'syzkaller1\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002d40)={@ipv4}, &(0x7f0000002d80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000002dc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002e40)=0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002e80)={{{@in6, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000002f80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003000)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000003100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003140)=0x14) accept4(0xffffffffffffffff, &(0x7f0000005bc0)=@xdp, &(0x7f0000005c40)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005cc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005d00)={{{@in6, @in6=@dev}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000005e00)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005f00)={0x0, @multicast2, @dev}, &(0x7f0000005f40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006240)={{{@in6, @in6}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000006340)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000006380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000063c0)=0x14, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007180)={&(0x7f00000004c0), 0xc, &(0x7f0000007140)={&(0x7f0000006400)={0x14}, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000a80)=ANY=[], &(0x7f00000005c0)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0), &(0x7f0000000900)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380), &(0x7f00000003c0)=0x8) syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000400)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f0000000640)=0x98) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}}, &(0x7f0000000840)=0xb0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58fe4}]}) connect$unix(0xffffffffffffffff, &(0x7f0000000940)=@file={0x0, './file0\x00'}, 0x6e) iopl(0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000580)=0x78) syz_execute_func(&(0x7f0000000b80)="428055a0876969ef69dc00d9f000e8a68f000080a480a420b17b6b07a2a237374f38211ac4e19086d90dba8fc9c90fee0852522179fb38c665f247af0f2e1ac4010d64ac1e5d31a3b706f080240308ca43020fbef5e04b") 06:48:47 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da06a0f460f46dc0f019e263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf26f042080b660f38302f3e26f043108900000000450f2e628af540d917c4a1ff701c3f04d6adbe90dfe2987e6e") 06:48:47 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x0, &(0x7f0000000640)) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x0, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x1d, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_LOCK(0x0, 0xb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0626969ef69dc00d9c421a05d2f8a20c4a151d09f00800000c4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000180)) shmget(0xffffffffffffffff, 0x400000, 0x0, &(0x7f0000c00000/0x400000)=nil) memfd_create(&(0x7f0000000040)='/dev/vsock\x00', 0x0) getpgid(0x0) geteuid() write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000340)={0x7}, 0x7) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000002900)) syz_open_dev$ndb(&(0x7f0000000300)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in6=@loopback, @in6}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000002a80)=0xe8) getegid() 06:48:47 executing program 0: mremap(&(0x7f0000ff2000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000ff0000/0x2000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000f80)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgroups(0x0, &(0x7f00000009c0)) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f00000000c0)='*/[wlan1\x00', 0xffffffffffffffff) request_key(&(0x7f00000002c0)="7573650500", &(0x7f0000000440), &(0x7f0000000680)='\x00', 0xfffffffffffffff9) keyctl$link(0x8, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) getpgrp(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000004c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xe8) stat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001900)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001940)={{{@in=@dev, @in=@multicast2}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000001ac0), &(0x7f0000001b00)) 06:48:48 executing program 1: setrlimit(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 06:48:48 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x0, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x0, &(0x7f0000000640)) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x0, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x1d, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_LOCK(0x0, 0xb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0626969ef69dc00d9c421a05d2f8a20c4a151d09f00800000c4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000180)) shmget(0xffffffffffffffff, 0x400000, 0x0, &(0x7f0000c00000/0x400000)=nil) memfd_create(&(0x7f0000000040)='/dev/vsock\x00', 0x0) getpgid(0x0) geteuid() write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000340)={0x7}, 0x7) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000002900)) syz_open_dev$ndb(&(0x7f0000000300)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in6=@loopback, @in6}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000002a80)=0xe8) getegid() 06:48:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) r2 = accept(r0, 0x0, &(0x7f0000000140)=0xffffffffffffffcd) getsockopt$inet6_tcp_int(r2, 0x6, 0x17, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 06:48:48 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da06a0f460f46dc0f019e263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf26f042080b660f38302f3e26f043108900000000450f2e628af540d917c4a1ff701c3f04d6adbe90dfe2987e6e") [ 243.889884] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:48:48 executing program 2: add_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480), &(0x7f00000004c0)='r', 0x1, 0xfffffffffffffffb) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getpid() fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000004c0)='statm\x00') setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000007c0), 0x4) symlinkat(&(0x7f0000000480)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00') mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f00000002c0)=""/165) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000500)={0x0, 0x0, 0x2ff, &(0x7f0000000480)}) request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280), &(0x7f0000000040)='-\x00', 0xfffffffffffffffb) io_setup(0x0, &(0x7f00000002c0)) io_cancel(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000700)}, &(0x7f0000000780)) keyctl$get_persistent(0x16, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001440)={@local}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000140)=0xe8) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0510fef69dc0f01ee0dce41cbff91dd91913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000380), &(0x7f00000003c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000400)=0x100) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) 06:48:48 executing program 0: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f0000000200)=0x8) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rfkill\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 06:48:49 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f0000000580)}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000480)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f00000003c0)=[@transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)}}], 0x0, 0x0, &(0x7f0000000080)}) 06:48:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x29) [ 244.390901] binder_alloc: 8701: binder_alloc_buf, no vma [ 244.403430] binder: 8701:8702 transaction failed 29189/-3, size 0-0 line 2973 06:48:49 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f0000000580)}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000480)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f00000003c0)=[@transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)}}], 0x0, 0x0, &(0x7f0000000080)}) 06:48:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x29) [ 244.479914] binder: release 8701:8702 transaction 16 in, still active [ 244.493848] binder: send failed reply for transaction 16 to 8701:8702 [ 244.500649] binder: undelivered TRANSACTION_ERROR: 29189 [ 244.547894] binder: undelivered TRANSACTION_COMPLETE [ 244.569444] binder_alloc: 8710: binder_alloc_buf, no vma [ 244.575658] binder: undelivered TRANSACTION_ERROR: 29189 [ 244.586735] binder: 8710:8711 transaction failed 29189/-3, size 0-0 line 2973 06:48:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x29) 06:48:49 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f0000000580)}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000480)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f00000003c0)=[@transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)}}], 0x0, 0x0, &(0x7f0000000080)}) [ 244.620569] binder: release 8710:8711 transaction 21 out, still active [ 244.629224] binder: unexpected work type, 4, not freed [ 244.647819] binder: undelivered TRANSACTION_COMPLETE [ 244.662766] binder: release 8710:8711 transaction 21 in, still active 06:48:49 executing program 3: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000380)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 244.714952] binder: send failed reply for transaction 21, target dead [ 244.736706] binder: undelivered TRANSACTION_ERROR: 29189 06:48:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x29) 06:48:49 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x2, 0x0) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000040)=0x100) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080), 0x10) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@multicast1, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@mcast1, @in6=@local}}, {{}, 0x0, @in6=@remote}}, &(0x7f00000007c0)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getgid() syz_open_dev$dmmidi(&(0x7f0000000b80)='/dev/dmmidi#\x00', 0x0, 0x0) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getgroups(0x0, &(0x7f0000000a80)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 06:48:49 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da06a0f460f46dc0f019e263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf26f042080b660f38302f3e26f043108900000000450f2e628af540d917c4a1ff701c3f04d6adbe90dfe2987e6e") [ 244.774367] binder_alloc: 8719: binder_alloc_buf, no vma [ 244.801350] binder: 8719:8720 transaction failed 29189/-3, size 0-0 line 2973 [ 244.862018] binder: release 8719:8720 transaction 26 out, still active [ 244.874329] binder: unexpected work type, 4, not freed [ 244.909622] binder: undelivered TRANSACTION_COMPLETE [ 244.938351] binder: release 8719:8720 transaction 26 in, still active [ 244.949025] binder: send failed reply for transaction 26, target dead [ 244.963218] binder: undelivered TRANSACTION_ERROR: 29189 06:48:49 executing program 2: add_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480), &(0x7f00000004c0)='r', 0x1, 0xfffffffffffffffb) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getpid() fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000004c0)='statm\x00') setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000007c0), 0x4) symlinkat(&(0x7f0000000480)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00') mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f00000002c0)=""/165) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000500)={0x0, 0x0, 0x2ff, &(0x7f0000000480)}) request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280), &(0x7f0000000040)='-\x00', 0xfffffffffffffffb) io_setup(0x0, &(0x7f00000002c0)) io_cancel(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000700)}, &(0x7f0000000780)) keyctl$get_persistent(0x16, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001440)={@local}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000140)=0xe8) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0510fef69dc0f01ee0dce41cbff91dd91913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000380), &(0x7f00000003c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000400)=0x100) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) 06:48:49 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f0000000580)}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000480)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f00000003c0)=[@transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)}}], 0x0, 0x0, &(0x7f0000000080)}) 06:48:49 executing program 1: memfd_create(&(0x7f0000000040)='self\x00', 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getgroups(0x0, &(0x7f0000000140)) fstat(0xffffffffffffffff, &(0x7f0000000180)) fstat(0xffffffffffffffff, &(0x7f0000000200)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) getresgid(&(0x7f0000000540), &(0x7f0000000380), &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000500)) getgid() getgid() getegid() getgroups(0x0, &(0x7f0000000400)) getgroups(0x0, &(0x7f00000004c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setgid(0x0) [ 245.119708] binder_alloc: 8739: binder_alloc_buf, no vma [ 245.132637] binder: 8739:8743 transaction failed 29189/-3, size 0-0 line 2973 [ 245.153354] binder: release 8739:8743 transaction 31 out, still active [ 245.160103] binder: unexpected work type, 4, not freed [ 245.194908] binder: undelivered TRANSACTION_COMPLETE 06:48:49 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000004c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000300), 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}}, 0xa0) bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0xfffffffffffffc85) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000340)}, 0x20) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000140)={'bridge0\x00'}) gettid() migrate_pages(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000280)={0x18}, 0x18) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0x18) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") [ 245.227269] binder: release 8739:8743 transaction 31 in, still active [ 245.234759] binder: send failed reply for transaction 31, target dead [ 245.241384] binder: undelivered TRANSACTION_ERROR: 29189 06:48:50 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000004c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000300), 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}}, 0xa0) bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0xfffffffffffffc85) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000340)}, 0x20) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000140)={'bridge0\x00'}) gettid() migrate_pages(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000280)={0x18}, 0x18) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0x18) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 06:48:50 executing program 3: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000380)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:50 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x2, 0x0) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000040)=0x100) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080), 0x10) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@multicast1, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@mcast1, @in6=@local}}, {{}, 0x0, @in6=@remote}}, &(0x7f00000007c0)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getgid() syz_open_dev$dmmidi(&(0x7f0000000b80)='/dev/dmmidi#\x00', 0x0, 0x0) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getgroups(0x0, &(0x7f0000000a80)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 06:48:50 executing program 5: setpriority(0x5, 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000300)) syz_emit_ethernet(0x0, &(0x7f0000000380)=ANY=[], 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={@remote, @local}, &(0x7f0000000700)=0xc) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000500)={0x0, 0x1, 0x29e, @random="c5e26b7b74da"}, 0xfffffffffffffd99) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x32a) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000e80)=ANY=[]) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) syz_emit_ethernet(0x66, &(0x7f0000000800)={@dev, @broadcast, [], {@mpls_mc={0x8848, {[], @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @loopback}, @gre}}}}}, &(0x7f0000000140)) getegid() ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {}, {0x2, 0x0, @dev}, {0x2, 0x0, @rand_addr}}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@broadcast, @remote}, 0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000680), 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000200)=""/59) prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 06:48:50 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000004c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000300), 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}}, 0xa0) bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0xfffffffffffffc85) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000340)}, 0x20) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000140)={'bridge0\x00'}) gettid() migrate_pages(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000280)={0x18}, 0x18) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0x18) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 06:48:50 executing program 2: add_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480), &(0x7f00000004c0)='r', 0x1, 0xfffffffffffffffb) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getpid() fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000004c0)='statm\x00') setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000007c0), 0x4) symlinkat(&(0x7f0000000480)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00') mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f00000002c0)=""/165) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000500)={0x0, 0x0, 0x2ff, &(0x7f0000000480)}) request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280), &(0x7f0000000040)='-\x00', 0xfffffffffffffffb) io_setup(0x0, &(0x7f00000002c0)) io_cancel(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000700)}, &(0x7f0000000780)) keyctl$get_persistent(0x16, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001440)={@local}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000140)=0xe8) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0510fef69dc0f01ee0dce41cbff91dd91913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000380), &(0x7f00000003c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000400)=0x100) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) 06:48:50 executing program 1: memfd_create(&(0x7f0000000040)='self\x00', 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getgroups(0x0, &(0x7f0000000140)) fstat(0xffffffffffffffff, &(0x7f0000000180)) fstat(0xffffffffffffffff, &(0x7f0000000200)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) getresgid(&(0x7f0000000540), &(0x7f0000000380), &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000500)) getgid() getgid() getegid() getgroups(0x0, &(0x7f0000000400)) getgroups(0x0, &(0x7f00000004c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setgid(0x0) 06:48:50 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000004c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000300), 0x0, 0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}}, 0xa0) bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0xfffffffffffffc85) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000340)}, 0x20) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000140)={'bridge0\x00'}) gettid() migrate_pages(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)}, 0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000280)={0x18}, 0x18) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f00000002c0)={0x18}, 0x18) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 06:48:51 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)={0x2, 0x1, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_spirange={0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:48:51 executing program 3: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000380)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:51 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)={0x2, 0x1, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_spirange={0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:48:51 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x2, 0x0) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000040)=0x100) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080), 0x10) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@multicast1, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@mcast1, @in6=@local}}, {{}, 0x0, @in6=@remote}}, &(0x7f00000007c0)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getgid() syz_open_dev$dmmidi(&(0x7f0000000b80)='/dev/dmmidi#\x00', 0x0, 0x0) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getgroups(0x0, &(0x7f0000000a80)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 06:48:51 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)={0x2, 0x1, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_spirange={0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:48:51 executing program 5: setpriority(0x5, 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000300)) syz_emit_ethernet(0x0, &(0x7f0000000380)=ANY=[], 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={@remote, @local}, &(0x7f0000000700)=0xc) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000500)={0x0, 0x1, 0x29e, @random="c5e26b7b74da"}, 0xfffffffffffffd99) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x32a) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000e80)=ANY=[]) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) syz_emit_ethernet(0x66, &(0x7f0000000800)={@dev, @broadcast, [], {@mpls_mc={0x8848, {[], @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @loopback}, @gre}}}}}, &(0x7f0000000140)) getegid() ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {}, {0x2, 0x0, @dev}, {0x2, 0x0, @rand_addr}}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@broadcast, @remote}, 0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000680), 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000200)=""/59) prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 06:48:51 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)={0x2, 0x1, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_spirange={0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 06:48:51 executing program 2: add_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480), &(0x7f00000004c0)='r', 0x1, 0xfffffffffffffffb) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getpid() fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000004c0)='statm\x00') setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000007c0), 0x4) symlinkat(&(0x7f0000000480)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00') mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f00000002c0)=""/165) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000500)={0x0, 0x0, 0x2ff, &(0x7f0000000480)}) request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280), &(0x7f0000000040)='-\x00', 0xfffffffffffffffb) io_setup(0x0, &(0x7f00000002c0)) io_cancel(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000700)}, &(0x7f0000000780)) keyctl$get_persistent(0x16, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001440)={@local}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000140)=0xe8) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000080)) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0510fef69dc0f01ee0dce41cbff91dd91913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000380), &(0x7f00000003c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000006c0)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000400)=0x100) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) 06:48:51 executing program 1: memfd_create(&(0x7f0000000040)='self\x00', 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getgroups(0x0, &(0x7f0000000140)) fstat(0xffffffffffffffff, &(0x7f0000000180)) fstat(0xffffffffffffffff, &(0x7f0000000200)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) getresgid(&(0x7f0000000540), &(0x7f0000000380), &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000500)) getgid() getgid() getegid() getgroups(0x0, &(0x7f0000000400)) getgroups(0x0, &(0x7f00000004c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setgid(0x0) 06:48:51 executing program 0: syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x0, 0xffe0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./bus\x00'}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) gettid() fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) lstat(&(0x7f00000030c0)='./bus\x00', &(0x7f0000003100)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000031c0)={{{@in6=@dev, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000003380)='./bus\x00', &(0x7f00000033c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 06:48:51 executing program 2: shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) msync(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) times(&(0x7f0000000440)) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f0000000a00)="f7fbffffff17", 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000008c0)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000009c0)=0x84) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)={'\x00', @ifru_addrs=@can}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000003c0)={@dev}, &(0x7f0000000400)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0x57) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe2}]}) syz_execute_func(&(0x7f00000003c0)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 06:48:52 executing program 3: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000380)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 06:48:52 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x2, 0x0) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000040)=0x100) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080), 0x10) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@multicast1, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@mcast1, @in6=@local}}, {{}, 0x0, @in6=@remote}}, &(0x7f00000007c0)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getgid() syz_open_dev$dmmidi(&(0x7f0000000b80)='/dev/dmmidi#\x00', 0x0, 0x0) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getgroups(0x0, &(0x7f0000000a80)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 06:48:52 executing program 5: setpriority(0x5, 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000300)) syz_emit_ethernet(0x0, &(0x7f0000000380)=ANY=[], 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={@remote, @local}, &(0x7f0000000700)=0xc) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000500)={0x0, 0x1, 0x29e, @random="c5e26b7b74da"}, 0xfffffffffffffd99) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x32a) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000e80)=ANY=[]) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) syz_emit_ethernet(0x66, &(0x7f0000000800)={@dev, @broadcast, [], {@mpls_mc={0x8848, {[], @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @loopback}, @gre}}}}}, &(0x7f0000000140)) getegid() ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {}, {0x2, 0x0, @dev}, {0x2, 0x0, @rand_addr}}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@broadcast, @remote}, 0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000680), 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000200)=""/59) prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 06:48:52 executing program 1: memfd_create(&(0x7f0000000040)='self\x00', 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getgroups(0x0, &(0x7f0000000140)) fstat(0xffffffffffffffff, &(0x7f0000000180)) fstat(0xffffffffffffffff, &(0x7f0000000200)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) getresgid(&(0x7f0000000540), &(0x7f0000000380), &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000500)) getgid() getgid() getegid() getgroups(0x0, &(0x7f0000000400)) getgroups(0x0, &(0x7f00000004c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setgid(0x0) 06:48:52 executing program 0: syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x0, 0xffe0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./bus\x00'}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) gettid() fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) lstat(&(0x7f00000030c0)='./bus\x00', &(0x7f0000003100)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000031c0)={{{@in6=@dev, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000003380)='./bus\x00', &(0x7f00000033c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 06:48:52 executing program 2: shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) msync(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) times(&(0x7f0000000440)) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f0000000a00)="f7fbffffff17", 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000008c0)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000009c0)=0x84) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)={'\x00', @ifru_addrs=@can}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000003c0)={@dev}, &(0x7f0000000400)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0x57) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe2}]}) syz_execute_func(&(0x7f00000003c0)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 06:48:53 executing program 3: keyctl$set_reqkey_keyring(0x12, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000380)) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000340)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000980)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000009c0)={'\x00', &(0x7f0000000a00)=ANY=[]}) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000000580)) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) sysinfo(&(0x7f00000003c0)=""/182) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) syz_execute_func(&(0x7f0000000180)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 06:48:53 executing program 4: keyctl$set_reqkey_keyring(0x5, 0xfffffffd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 06:48:53 executing program 5: setpriority(0x5, 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000300)) syz_emit_ethernet(0x0, &(0x7f0000000380)=ANY=[], 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={@remote, @local}, &(0x7f0000000700)=0xc) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000500)={0x0, 0x1, 0x29e, @random="c5e26b7b74da"}, 0xfffffffffffffd99) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x32a) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000e80)=ANY=[]) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) syz_emit_ethernet(0x66, &(0x7f0000000800)={@dev, @broadcast, [], {@mpls_mc={0x8848, {[], @ipv4={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @loopback}, @gre}}}}}, &(0x7f0000000140)) getegid() ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {}, {0x2, 0x0, @dev}, {0x2, 0x0, @rand_addr}}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@broadcast, @remote}, 0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000680), 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000200)=""/59) prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 06:48:53 executing program 0: syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x0, 0xffe0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./bus\x00'}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) gettid() fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) lstat(&(0x7f00000030c0)='./bus\x00', &(0x7f0000003100)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000031c0)={{{@in6=@dev, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000003380)='./bus\x00', &(0x7f00000033c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 06:48:53 executing program 2: shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) msync(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) times(&(0x7f0000000440)) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f0000000a00)="f7fbffffff17", 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000008c0)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000009c0)=0x84) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)={'\x00', @ifru_addrs=@can}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000003c0)={@dev}, &(0x7f0000000400)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0x57) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe2}]}) syz_execute_func(&(0x7f00000003c0)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 06:48:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000000), 0x4000000000000fe, 0x0) [ 249.261304] kasan: CONFIG_KASAN_INLINE enabled [ 249.273258] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 249.284391] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 249.290642] CPU: 0 PID: 8871 Comm: syz-executor1 Not tainted 4.19.0-rc4-next-20180918+ #74 [ 249.299039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.308446] RIP: 0010:__skb_flow_dissect+0x3b5/0x5980 [ 249.313644] Code: 48 c1 ea 03 80 3c 02 00 0f 85 a6 4d 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 77 10 49 8d be 80 05 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 5c 4d 00 00 4d 8b b6 80 05 00 00 48 b8 00 00 00 [ 249.332548] RSP: 0018:ffff8801bffc6d90 EFLAGS: 00010202 [ 249.337915] RAX: dffffc0000000000 RBX: ffff8801bffc7160 RCX: ffffc90002248000 [ 249.345183] RDX: 00000000000000b0 RSI: ffffffff861227d8 RDI: 0000000000000580 [ 249.352451] RBP: ffff8801bffc74f0 R08: ffff8801d23843c0 R09: ffffed003b5a5b57 [ 249.359718] R10: ffffed003b5a5b57 R11: ffff8801dad2dabb R12: ffffffff8a5202a4 [ 249.366981] R13: ffffffff8a5202a6 R14: 0000000000000000 R15: ffff8801d3025440 [ 249.374255] FS: 00007f066246f700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 249.382473] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 249.388346] CR2: 0000001b3012b000 CR3: 00000001ba5c8000 CR4: 00000000001406f0 [ 249.395629] DR0: 000000000000b8c4 DR1: 0000000000000000 DR2: 0000000000000000 [ 249.402889] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 249.410147] Call Trace: [ 249.412745] ? depot_save_stack+0x292/0x470 [ 249.417158] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 249.422268] ? skb_flow_dissect_tunnel_info+0xd80/0xd80 [ 249.427645] ? depot_save_stack+0x292/0x470 [ 249.431969] ? trace_hardirqs_off_caller+0x300/0x300 [ 249.437072] ? kasan_check_write+0x14/0x20 [ 249.441314] ? do_raw_spin_lock+0xc1/0x200 [ 249.445548] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 249.450653] ? depot_save_stack+0x292/0x470 [ 249.454974] ? save_stack+0xa9/0xd0 [ 249.458600] ? save_stack+0x43/0xd0 [ 249.462220] ? kasan_kmalloc+0xc7/0xe0 [ 249.466112] ? __kmalloc_node_track_caller+0x47/0x70 [ 249.471276] ? __kmalloc_reserve.isra.39+0x41/0xe0 [ 249.476202] ? __alloc_skb+0x150/0x770 [ 249.480096] ? alloc_skb_with_frags+0x133/0x7d0 [ 249.484794] ? sock_alloc_send_pskb+0x865/0xab0 [ 249.489484] ? unix_dgram_sendmsg+0x50b/0x1750 [ 249.494066] ? sock_sendmsg+0xd5/0x120 [ 249.497962] ? ___sys_sendmsg+0x51d/0x930 [ 249.502113] ? __sys_sendmmsg+0x246/0x6d0 [ 249.506257] ? __x64_sys_sendmmsg+0x9d/0x100 [ 249.510664] ? do_syscall_64+0x1b9/0x820 [ 249.514721] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.520084] ? rcu_softirq_qs+0x20/0x20 [ 249.524067] ? kmem_cache_alloc_node_trace+0x5b5/0x740 [ 249.529353] ? print_usage_bug+0xc0/0xc0 [ 249.533423] ? check_preemption_disabled+0x48/0x200 [ 249.538445] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 249.543987] ? rcu_pm_notify+0xc0/0xc0 [ 249.547876] ? __lock_acquire+0x7ec/0x4ec0 [ 249.552115] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 249.557398] ? kasan_unpoison_shadow+0x35/0x50 [ 249.561978] ? kasan_kmalloc+0xc7/0xe0 [ 249.565867] ? mark_held_locks+0x130/0x130 [ 249.570114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 249.575658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.581191] ? __alloc_skb+0x4c1/0x770 [ 249.585079] ? skb_scrub_packet+0x490/0x490 [ 249.589413] ? mark_held_locks+0x130/0x130 [ 249.593646] ? __lock_acquire+0x7ec/0x4ec0 [ 249.597913] ? find_held_lock+0x36/0x1c0 [ 249.601997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.607531] ? refcount_add_not_zero_checked+0x21e/0x330 [ 249.612985] ? refcount_dec_if_one+0x180/0x180 [ 249.617568] ? alloc_skb_with_frags+0x508/0x7d0 [ 249.622235] ? ttwu_stat+0x5c0/0x5c0 [ 249.625953] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 249.631486] ? refcount_add_checked+0x2f/0x70 [ 249.635983] ? graph_lock+0x170/0x170 [ 249.639783] skb_get_poff+0x9b/0x1c0 [ 249.643494] ? skb_get_poff+0x9b/0x1c0 [ 249.647382] ? __skb_get_poff+0x2f0/0x2f0 [ 249.651533] ? __lock_is_held+0xb5/0x140 [ 249.655650] bpf_skb_get_pay_offset+0x15/0x20 [ 249.660155] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 249.665692] ? sk_filter_trim_cap+0x38e/0xa60 [ 249.670187] ? bpf_l3_csum_replace+0x4d0/0x4d0 [ 249.674767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.680305] ? skb_copy_datagram_from_iter+0x451/0x660 [ 249.685591] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 249.690606] ? unix_dgram_sendmsg+0x76c/0x1750 [ 249.695192] ? unix_stream_connect+0x1270/0x1270 [ 249.699951] ? aa_af_perm+0x5a0/0x5a0 [ 249.703751] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 249.709282] ? _copy_from_user+0xdf/0x150 [ 249.713429] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 249.718552] ? apparmor_socket_sendmsg+0x29/0x30 [ 249.723308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.728845] ? security_socket_sendmsg+0x94/0xc0 [ 249.733598] ? unix_stream_connect+0x1270/0x1270 [ 249.738355] ? sock_sendmsg+0xd5/0x120 [ 249.742245] ? ___sys_sendmsg+0x51d/0x930 [ 249.746484] ? copy_msghdr_from_user+0x580/0x580 [ 249.751239] ? _raw_spin_unlock_bh+0x30/0x40 [ 249.755648] ? bpf_prog_store_orig_filter.isra.52+0x147/0x1f0 [ 249.761532] ? __release_sock+0x3a0/0x3a0 [ 249.765680] ? __fget_light+0x2e9/0x430 [ 249.769655] ? fget_raw+0x20/0x20 [ 249.773118] ? sock_enable_timestamp+0xe0/0xe0 [ 249.777705] ? ttwu_stat+0x5c0/0x5c0 [ 249.781425] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 249.786958] ? sockfd_lookup_light+0xc5/0x160 [ 249.791450] ? __sys_sendmmsg+0x246/0x6d0 [ 249.795597] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 249.799919] ? aa_sock_opt_perm.isra.11+0xa1/0x130 [ 249.804855] ? __x64_sys_futex+0x47f/0x6a0 [ 249.809098] ? do_syscall_64+0x9a/0x820 [ 249.813069] ? do_syscall_64+0x9a/0x820 [ 249.817051] ? lockdep_hardirqs_on+0x421/0x5c0 [ 249.821633] ? trace_hardirqs_on+0xbd/0x310 [ 249.825954] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.831319] ? trace_hardirqs_off_caller+0x300/0x300 [ 249.836431] ? __x64_sys_sendmmsg+0x9d/0x100 [ 249.840852] ? do_syscall_64+0x1b9/0x820 [ 249.844916] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 249.850290] ? syscall_return_slowpath+0x5e0/0x5e0 [ 249.855227] ? trace_hardirqs_off+0x310/0x310 06:48:54 executing program 3: keyctl$set_reqkey_keyring(0x12, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000380)) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000340)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000980)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000009c0)={'\x00', &(0x7f0000000a00)=ANY=[]}) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000000580)) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) sysinfo(&(0x7f00000003c0)=""/182) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) syz_execute_func(&(0x7f0000000180)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 06:48:54 executing program 4: keyctl$set_reqkey_keyring(0x5, 0xfffffffd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") [ 249.859728] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 249.864751] ? recalc_sigpending_tsk+0x180/0x180 [ 249.869512] ? kasan_check_write+0x14/0x20 [ 249.873750] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.878599] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.883958] Modules linked in: [ 249.890907] kobject: 'loop3' (000000001a76e08e): kobject_uevent_env [ 249.900890] kobject: 'loop3' (000000001a76e08e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 249.924327] ---[ end trace 9dd97e7dabe0f847 ]--- [ 249.938052] RIP: 0010:__skb_flow_dissect+0x3b5/0x5980 [ 249.947822] kobject: 'loop4' (000000004edf4d9c): kobject_uevent_env [ 249.955562] Code: 48 c1 ea 03 80 3c 02 00 0f 85 a6 4d 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 77 10 49 8d be 80 05 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 5c 4d 00 00 4d 8b b6 80 05 00 00 48 b8 00 00 00 06:48:54 executing program 2: shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) msync(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) times(&(0x7f0000000440)) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f0000000a00)="f7fbffffff17", 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000800)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000008c0)=0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f00000009c0)=0x84) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)={'\x00', @ifru_addrs=@can}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000003c0)={@dev}, &(0x7f0000000400)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0x57) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe2}]}) syz_execute_func(&(0x7f00000003c0)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") [ 249.986108] kobject: 'loop4' (000000004edf4d9c): fill_kobj_path: path = '/devices/virtual/block/loop4' 06:48:54 executing program 0: syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x0, 0xffe0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./bus\x00'}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) gettid() fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) lstat(&(0x7f00000030c0)='./bus\x00', &(0x7f0000003100)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000031c0)={{{@in6=@dev, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000003380)='./bus\x00', &(0x7f00000033c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 06:48:54 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000140)) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, &(0x7f0000000180)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000002f00)=""/4096, &(0x7f0000000600)=0x1321) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") [ 250.030521] kobject: 'loop2' (00000000a530a7ac): kobject_uevent_env [ 250.038602] RSP: 0018:ffff8801bffc6d90 EFLAGS: 00010202 [ 250.052829] kobject: 'loop2' (00000000a530a7ac): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 250.068148] RAX: dffffc0000000000 RBX: ffff8801bffc7160 RCX: ffffc90002248000 [ 250.086581] RDX: 00000000000000b0 RSI: ffffffff861227d8 RDI: 0000000000000580 [ 250.089177] kobject: 'loop0' (00000000c4c94ee8): kobject_uevent_env [ 250.106957] syz-executor5 uses obsolete (PF_INET,SOCK_PACKET) [ 250.116593] kobject: 'loop0' (00000000c4c94ee8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 250.137924] kasan: CONFIG_KASAN_INLINE enabled [ 250.145853] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 250.146296] kobject: 'loop5' (000000003706c68d): kobject_uevent_env [ 250.171878] kobject: 'loop5' (000000003706c68d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 250.173202] RBP: ffff8801bffc74f0 R08: ffff8801d23843c0 R09: ffffed003b5a5b57 [ 250.245528] general protection fault: 0000 [#2] PREEMPT SMP KASAN [ 250.251820] CPU: 1 PID: 8885 Comm: syz-executor1 Tainted: G D 4.19.0-rc4-next-20180918+ #74 [ 250.261618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.270991] RIP: 0010:__skb_flow_dissect+0x3b5/0x5980 [ 250.276185] Code: 48 c1 ea 03 80 3c 02 00 0f 85 a6 4d 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 77 10 49 8d be 80 05 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 5c 4d 00 00 4d 8b b6 80 05 00 00 48 b8 00 00 00 [ 250.295096] RSP: 0018:ffff8801685fed90 EFLAGS: 00010202 [ 250.300466] RAX: dffffc0000000000 RBX: ffff8801685ff160 RCX: ffffc90003250000 [ 250.307734] RDX: 00000000000000b0 RSI: ffffffff861227d8 RDI: 0000000000000580 [ 250.314999] RBP: ffff8801685ff4f0 R08: ffff880167d44340 R09: 0000000000000000 [ 250.322269] R10: ffff8801685ff508 R11: 0000000000000000 R12: ffffffff8a5202a4 [ 250.329542] R13: ffffffff8a5202a6 R14: 0000000000000000 R15: ffff8801d7555180 [ 250.336810] FS: 00007f066242d700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 250.345031] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 250.350907] CR2: 0000000001fd57d0 CR3: 00000001ba5c8000 CR4: 00000000001406e0 [ 250.358176] DR0: 000000000000b8c4 DR1: 0000000000000000 DR2: 0000000000000000 [ 250.365442] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 250.372706] Call Trace: [ 250.375299] ? kasan_check_read+0x11/0x20 [ 250.379449] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 250.384728] ? rcu_softirq_qs+0x20/0x20 [ 250.388706] ? skb_flow_dissect_tunnel_info+0xd80/0xd80 [ 250.394068] ? kernel_text_address+0x79/0xf0 [ 250.398486] ? __kernel_text_address+0xd/0x40 [ 250.402988] ? arch_uprobe_abort_xol+0x1b0/0x200 [ 250.407742] ? __save_stack_trace+0x8d/0xf0 [ 250.412071] ? save_stack+0xa9/0xd0 [ 250.415726] ? save_stack+0x43/0xd0 [ 250.419352] ? kasan_kmalloc+0xc7/0xe0 [ 250.423241] ? __kmalloc_node_track_caller+0x47/0x70 [ 250.428340] ? __kmalloc_reserve.isra.39+0x41/0xe0 [ 250.433264] ? __alloc_skb+0x150/0x770 [ 250.437149] ? alloc_skb_with_frags+0x133/0x7d0 [ 250.441814] ? sock_alloc_send_pskb+0x865/0xab0 [ 250.446480] ? unix_dgram_sendmsg+0x50b/0x1750 [ 250.451057] ? sock_sendmsg+0xd5/0x120 [ 250.454940] ? ___sys_sendmsg+0x51d/0x930 [ 250.459097] ? __sys_sendmmsg+0x246/0x6d0 [ 250.463246] ? __x64_sys_sendmmsg+0x9d/0x100 [ 250.467655] ? do_syscall_64+0x1b9/0x820 [ 250.471715] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.477079] ? mem_cgroup_handle_over_high+0x130/0x130 [ 250.482372] ? lock_downgrade+0x900/0x900 [ 250.486528] ? percpu_ref_put_many+0x13e/0x260 [ 250.491120] ? trace_hardirqs_on+0xbd/0x310 [ 250.495446] ? mem_cgroup_charge_statistics+0x780/0x780 [ 250.500813] ? kasan_unpoison_shadow+0x35/0x50 [ 250.505392] ? kasan_kmalloc+0xc7/0xe0 [ 250.509283] ? kmem_cache_alloc_node_trace+0x305/0x740 [ 250.514560] ? kasan_unpoison_shadow+0x35/0x50 [ 250.519227] ? kasan_kmalloc+0xc7/0xe0 [ 250.523130] ? mark_held_locks+0x130/0x130 [ 250.527372] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 250.532913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.538448] ? __alloc_skb+0x4c1/0x770 [ 250.542337] ? skb_scrub_packet+0x490/0x490 [ 250.546656] ? mark_held_locks+0x130/0x130 [ 250.550895] ? mark_held_locks+0x130/0x130 [ 250.555129] ? finish_task_switch+0x1f5/0x900 [ 250.559632] ? trace_hardirqs_off_caller+0x300/0x300 [ 250.564731] ? compat_start_thread+0x80/0x80 [ 250.569155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.574692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.580228] ? refcount_add_not_zero_checked+0x21e/0x330 [ 250.585922] ? refcount_dec_if_one+0x180/0x180 [ 250.590503] ? alloc_skb_with_frags+0x508/0x7d0 [ 250.595172] ? preempt_notifier_register+0x200/0x200 [ 250.600278] ? __switch_to_asm+0x34/0x70 [ 250.604337] ? __switch_to_asm+0x34/0x70 [ 250.608395] ? __switch_to_asm+0x40/0x70 [ 250.612461] ? __switch_to_asm+0x40/0x70 [ 250.616520] ? __switch_to_asm+0x40/0x70 [ 250.620586] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 250.626123] ? refcount_add_checked+0x2f/0x70 [ 250.630618] skb_get_poff+0x9b/0x1c0 [ 250.634328] ? skb_get_poff+0x9b/0x1c0 [ 250.638217] ? __skb_get_poff+0x2f0/0x2f0 [ 250.642369] ? lock_release+0x970/0x970 [ 250.646345] ? sock_wmalloc+0x1f0/0x1f0 [ 250.650329] bpf_skb_get_pay_offset+0x15/0x20 [ 250.654832] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 250.660372] ? sk_filter_trim_cap+0x38e/0xa60 [ 250.664872] ? bpf_l3_csum_replace+0x4d0/0x4d0 [ 250.669457] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.674990] ? skb_copy_datagram_from_iter+0x451/0x660 [ 250.680266] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 250.685282] ? unix_dgram_sendmsg+0x76c/0x1750 [ 250.689873] ? unix_stream_connect+0x1270/0x1270 06:48:55 executing program 3: keyctl$set_reqkey_keyring(0x12, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000380)) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000340)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000980)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000009c0)={'\x00', &(0x7f0000000a00)=ANY=[]}) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000000580)) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) sysinfo(&(0x7f00000003c0)=""/182) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) syz_execute_func(&(0x7f0000000180)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") [ 250.694633] ? aa_af_perm+0x5a0/0x5a0 [ 250.698433] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 250.703977] ? _copy_from_user+0xdf/0x150 [ 250.708134] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 250.713071] ? apparmor_socket_sendmsg+0x29/0x30 [ 250.718314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.723848] ? security_socket_sendmsg+0x94/0xc0 [ 250.728613] ? unix_stream_connect+0x1270/0x1270 [ 250.729159] kobject: 'loop3' (000000001a76e08e): kobject_uevent_env [ 250.733375] ? sock_sendmsg+0xd5/0x120 [ 250.733392] ? ___sys_sendmsg+0x51d/0x930 [ 250.733412] ? __switch_to_asm+0x40/0x70 [ 250.749805] kobject: 'loop3' (000000001a76e08e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 250.751865] ? copy_msghdr_from_user+0x580/0x580 [ 250.751948] ? __sched_text_start+0x8/0x8 [ 250.770199] ? __fget+0x4aa/0x740 [ 250.773666] ? __might_fault+0x12b/0x1e0 [ 250.777728] ? lock_downgrade+0x900/0x900 [ 250.781882] ? lock_release+0x970/0x970 [ 250.785872] ? ttwu_stat+0x5c0/0x5c0 [ 250.789587] ? kcov_ioctl+0x56/0x1f0 [ 250.793305] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 250.798062] ? ttwu_stat+0x5c0/0x5c0 [ 250.801789] ? __sys_sendmmsg+0x246/0x6d0 [ 250.805941] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 250.810261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.815800] ? do_vfs_ioctl+0x201/0x1720 [ 250.819869] ? ioctl_preallocate+0x300/0x300 [ 250.824279] ? __fget_light+0x2e9/0x430 [ 250.828257] ? finish_task_switch+0x1f5/0x900 [ 250.832754] ? lock_downgrade+0x900/0x900 [ 250.836901] ? finish_task_switch+0x1b5/0x900 [ 250.841402] ? trace_hardirqs_on+0xbd/0x310 [ 250.845722] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.851098] ? trace_hardirqs_off_caller+0x300/0x300 [ 250.856209] ? __x64_sys_sendmmsg+0x9d/0x100 [ 250.860622] ? do_syscall_64+0x1b9/0x820 [ 250.864680] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 250.870046] ? syscall_return_slowpath+0x5e0/0x5e0 [ 250.874975] ? trace_hardirqs_off+0x310/0x310 [ 250.879472] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 250.884485] ? recalc_sigpending_tsk+0x180/0x180 [ 250.889238] ? kasan_check_write+0x14/0x20 [ 250.893474] ? trace_hardirqs_off_thunk+0x1a/0x1c 06:48:55 executing program 4: keyctl$set_reqkey_keyring(0x5, 0xfffffffd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") [ 250.898323] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.903682] Modules linked in: [ 250.914816] R10: ffffed003b5a5b57 R11: ffff8801dad2dabb R12: ffffffff8a5202a4 [ 250.923735] R13: ffffffff8a5202a6 R14: 0000000000000000 R15: ffff8801d3025440 [ 250.931140] FS: 00007f066246f700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 250.941757] kobject: 'loop4' (000000004edf4d9c): kobject_uevent_env 06:48:55 executing program 0: msgget(0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000040)) getuid() getgid() gettid() gettid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000200)) eventfd(0x0) inotify_init() seccomp(0x1, 0x0, &(0x7f0000002200)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000280)) add_key(&(0x7f0000000180)='blacklist\x00', &(0x7f0000000780), 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340), &(0x7f00000004c0)='rxrpc\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000640)='big_key\x00', &(0x7f0000000800), &(0x7f00000009c0), 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f0000000440)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000400)='*#(-nodev@\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000500)=0xe8) getgid() openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000680), &(0x7f00000006c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000700)=ANY=[], 0x0) memfd_create(&(0x7f0000000080)='\\md5sum-\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000c00)=ANY=[]) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000380), 0x4) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000007c0)={0x28}, 0x28) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000100)=0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000900)=@buf={0x0, &(0x7f00000008c0)}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 250.953062] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 250.960991] kobject: 'loop4' (000000004edf4d9c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 250.983894] CR2: 00007fefa2261518 CR3: 00000001ba5c8000 CR4: 00000000001406f0 [ 250.997488] kobject: 'loop0' (00000000c4c94ee8): kobject_uevent_env [ 251.004100] kobject: 'loop0' (00000000c4c94ee8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 251.015968] DR0: 000000000000b8c4 DR1: 0000000000000000 DR2: 0000000000000000 [ 251.029618] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 251.037041] Kernel panic - not syncing: Fatal exception [ 251.043295] Kernel Offset: disabled [ 251.046917] Rebooting in 86400 seconds..