/file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:34:52 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:34:52 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e80)={@remote}, &(0x7f0000006ec0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007040), 0x0, 0x0, &(0x7f0000007080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000007280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000072c0)={{{@in=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000073c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007580)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000075c0)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000076c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007700)={@mcast1}, &(0x7f0000007740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007cc0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007f00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007f40)={'erspan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008540)={&(0x7f0000000340), 0xc, &(0x7f0000008500)={&(0x7f0000007f80)={0x14}, 0x14}}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.capability\x00') syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 03:34:52 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:34:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:34:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:34:52 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:34:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:34:52 executing program 3: syz_extract_tcp_res(&(0x7f0000000300), 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000480)='/dev/md0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000740)) getresuid(&(0x7f0000000140), &(0x7f0000000580), &(0x7f0000000600)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'ip6tnl0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000005c0)={0x0, 0x1, 0x6}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) 03:34:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x0, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:34:53 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:34:53 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e80)={@remote}, &(0x7f0000006ec0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007040), 0x0, 0x0, &(0x7f0000007080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000007280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000072c0)={{{@in=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000073c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007580)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000075c0)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000076c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007700)={@mcast1}, &(0x7f0000007740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007cc0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007f00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007f40)={'erspan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008540)={&(0x7f0000000340), 0xc, &(0x7f0000008500)={&(0x7f0000007f80)={0x14}, 0x14}}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.capability\x00') syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 03:34:53 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:34:53 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:34:53 executing program 3: syz_extract_tcp_res(&(0x7f0000000300), 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000340), 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000480)='/dev/md0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000740)) getresuid(&(0x7f0000000140), &(0x7f0000000580), &(0x7f0000000600)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'ip6tnl0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000005c0)={0x0, 0x1, 0x6}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) 03:34:53 executing program 3: syz_extract_tcp_res(&(0x7f0000000300), 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000340), 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000480)='/dev/md0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000740)) getresuid(&(0x7f0000000140), &(0x7f0000000580), &(0x7f0000000600)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'ip6tnl0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000005c0)={0x0, 0x1, 0x6}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) 03:34:54 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) 03:34:54 executing program 3: syz_extract_tcp_res(&(0x7f0000000300), 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000340), 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000480)='/dev/md0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000740)) getresuid(&(0x7f0000000140), &(0x7f0000000580), &(0x7f0000000600)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'ip6tnl0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000005c0)={0x0, 0x1, 0x6}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) 03:34:54 executing program 3: syz_extract_tcp_res(&(0x7f0000000300), 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000340), 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000480)='/dev/md0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000740)) getresuid(&(0x7f0000000140), &(0x7f0000000580), &(0x7f0000000600)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'ip6tnl0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000005c0)={0x0, 0x1, 0x6}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) 03:34:54 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e80)={@remote}, &(0x7f0000006ec0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007040), 0x0, 0x0, &(0x7f0000007080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000007280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000072c0)={{{@in=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000073c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007580)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000075c0)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000076c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007700)={@mcast1}, &(0x7f0000007740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007cc0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007f00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007f40)={'erspan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008540)={&(0x7f0000000340), 0xc, &(0x7f0000008500)={&(0x7f0000007f80)={0x14}, 0x14}}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.capability\x00') syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 03:34:54 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:34:54 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x0, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:34:54 executing program 3: syz_extract_tcp_res(&(0x7f0000000300), 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000340), 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000480)='/dev/md0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000740)) getresuid(&(0x7f0000000140), &(0x7f0000000580), &(0x7f0000000600)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'ip6tnl0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000005c0)={0x0, 0x1, 0x6}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) 03:34:54 executing program 3: syz_extract_tcp_res(&(0x7f0000000300), 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000340), 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000480)='/dev/md0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000740)) getresuid(&(0x7f0000000140), &(0x7f0000000580), &(0x7f0000000600)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'ip6tnl0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000005c0)={0x0, 0x1, 0x6}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) 03:34:54 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:34:54 executing program 3: syz_extract_tcp_res(&(0x7f0000000300), 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000340), 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000480)='/dev/md0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000740)) getresuid(&(0x7f0000000140), &(0x7f0000000580), &(0x7f0000000600)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'ip6tnl0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000005c0)={0x0, 0x1, 0x6}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) 03:34:54 executing program 3: syz_extract_tcp_res(&(0x7f0000000300), 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000340), 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000480)='/dev/md0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000740)) getresuid(&(0x7f0000000140), &(0x7f0000000580), &(0x7f0000000600)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'ip6tnl0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000005c0)={0x0, 0x1, 0x6}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) 03:34:54 executing program 3: syz_extract_tcp_res(&(0x7f0000000300), 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000340), 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000480)='/dev/md0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000740)) getresuid(&(0x7f0000000140), &(0x7f0000000580), &(0x7f0000000600)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'ip6tnl0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000005c0)={0x0, 0x1, 0x6}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) 03:34:54 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) 03:34:55 executing program 3: syz_extract_tcp_res(&(0x7f0000000300), 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000340), 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000480)='/dev/md0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000740)) getresuid(&(0x7f0000000140), &(0x7f0000000580), &(0x7f0000000600)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'ip6tnl0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000005c0)={0x0, 0x1, 0x6}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) [ 585.641097] audit: type=1326 audit(2000000095.074:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=17652 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:55 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e80)={@remote}, &(0x7f0000006ec0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007040), 0x0, 0x0, &(0x7f0000007080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000007280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000072c0)={{{@in=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000073c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007580)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000075c0)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000076c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007700)={@mcast1}, &(0x7f0000007740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007cc0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007f00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007f40)={'erspan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008540)={&(0x7f0000000340), 0xc, &(0x7f0000008500)={&(0x7f0000007f80)={0x14}, 0x14}}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.capability\x00') syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 03:34:55 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:34:55 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:34:55 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x0, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:34:55 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) 03:34:55 executing program 3: syz_extract_tcp_res(&(0x7f0000000300), 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000340), 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000480)='/dev/md0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000740)) getresuid(&(0x7f0000000140), &(0x7f0000000580), &(0x7f0000000600)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'ip6tnl0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000005c0)={0x0, 0x1, 0x6}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) [ 586.523041] audit: type=1326 audit(2000000095.954:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=17676 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:56 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e80)={@remote}, &(0x7f0000006ec0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007040), 0x0, 0x0, &(0x7f0000007080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000007280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000072c0)={{{@in=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000073c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007580)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000075c0)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000076c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007700)={@mcast1}, &(0x7f0000007740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007cc0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007f00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007f40)={'erspan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008540)={&(0x7f0000000340), 0xc, &(0x7f0000008500)={&(0x7f0000007f80)={0x14}, 0x14}}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.capability\x00') syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 03:34:56 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:34:56 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:34:56 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:34:56 executing program 3: syz_extract_tcp_res(&(0x7f0000000300), 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000340), 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000480)='/dev/md0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000740)) getresuid(&(0x7f0000000140), &(0x7f0000000580), &(0x7f0000000600)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'ip6tnl0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000005c0)={0x0, 0x1, 0x6}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) 03:34:56 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) [ 587.393376] audit: type=1326 audit(2000000096.824:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=17697 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:56 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e80)={@remote}, &(0x7f0000006ec0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007040), 0x0, 0x0, &(0x7f0000007080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000007280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000072c0)={{{@in=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000073c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007580)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000075c0)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000076c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007700)={@mcast1}, &(0x7f0000007740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007cc0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007f00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007f40)={'erspan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008540)={&(0x7f0000000340), 0xc, &(0x7f0000008500)={&(0x7f0000007f80)={0x14}, 0x14}}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.capability\x00') syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 03:34:56 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:34:57 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e80)={@remote}, &(0x7f0000006ec0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007040), 0x0, 0x0, &(0x7f0000007080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000007280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000072c0)={{{@in=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000073c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007580)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000075c0)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000076c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007700)={@mcast1}, &(0x7f0000007740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007cc0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007f00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007f40)={'erspan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008540)={&(0x7f0000000340), 0xc, &(0x7f0000008500)={&(0x7f0000007f80)={0x14}, 0x14}}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.capability\x00') syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 03:34:57 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:34:57 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e80)={@remote}, &(0x7f0000006ec0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007040), 0x0, 0x0, &(0x7f0000007080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000007280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000072c0)={{{@in=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000073c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007580)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000075c0)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000076c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007700)={@mcast1}, &(0x7f0000007740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007cc0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007f00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007f40)={'erspan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008540)={&(0x7f0000000340), 0xc, &(0x7f0000008500)={&(0x7f0000007f80)={0x14}, 0x14}}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.capability\x00') syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 03:34:57 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e80)={@remote}, &(0x7f0000006ec0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007040), 0x0, 0x0, &(0x7f0000007080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000007280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000072c0)={{{@in=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000073c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007580)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000075c0)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000076c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007700)={@mcast1}, &(0x7f0000007740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007cc0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007f00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007f40)={'erspan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008540)={&(0x7f0000000340), 0xc, &(0x7f0000008500)={&(0x7f0000007f80)={0x14}, 0x14}}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.capability\x00') syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 03:34:57 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e80)={@remote}, &(0x7f0000006ec0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007040), 0x0, 0x0, &(0x7f0000007080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000007280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000072c0)={{{@in=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000073c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007580)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000075c0)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000076c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007700)={@mcast1}, &(0x7f0000007740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007cc0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007f00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007f40)={'erspan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008540)={&(0x7f0000000340), 0xc, &(0x7f0000008500)={&(0x7f0000007f80)={0x14}, 0x14}}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.capability\x00') syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 03:34:57 executing program 3: clone(0x200, &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/159) socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, 0xfffffffffffffffe) 03:34:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:34:57 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e80)={@remote}, &(0x7f0000006ec0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007040), 0x0, 0x0, &(0x7f0000007080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000007280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000072c0)={{{@in=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000073c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007580)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000075c0)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000076c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007700)={@mcast1}, &(0x7f0000007740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007cc0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007f00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007f40)={'erspan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008540)={&(0x7f0000000340), 0xc, &(0x7f0000008500)={&(0x7f0000007f80)={0x14}, 0x14}}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.capability\x00') syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 03:34:57 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:34:57 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:34:57 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e80)={@remote}, &(0x7f0000006ec0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007040), 0x0, 0x0, &(0x7f0000007080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000007280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000072c0)={{{@in=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000073c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007580)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000075c0)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000076c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007700)={@mcast1}, &(0x7f0000007740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007cc0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007f00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007f40)={'erspan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008540)={&(0x7f0000000340), 0xc, &(0x7f0000008500)={&(0x7f0000007f80)={0x14}, 0x14}}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.capability\x00') syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 03:34:58 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e80)={@remote}, &(0x7f0000006ec0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007040), 0x0, 0x0, &(0x7f0000007080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000007280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000072c0)={{{@in=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000073c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007580)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000075c0)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000076c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007700)={@mcast1}, &(0x7f0000007740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007cc0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007f00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007f40)={'erspan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008540)={&(0x7f0000000340), 0xc, &(0x7f0000008500)={&(0x7f0000007f80)={0x14}, 0x14}}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.capability\x00') syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 03:34:58 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e80)={@remote}, &(0x7f0000006ec0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007040), 0x0, 0x0, &(0x7f0000007080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000007280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000072c0)={{{@in=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000073c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007580)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000075c0)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000076c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007700)={@mcast1}, &(0x7f0000007740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007cc0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007f00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007f40)={'erspan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008540)={&(0x7f0000000340), 0xc, &(0x7f0000008500)={&(0x7f0000007f80)={0x14}, 0x14}}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.capability\x00') syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 03:34:58 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:34:58 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e80)={@remote}, &(0x7f0000006ec0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007040), 0x0, 0x0, &(0x7f0000007080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000007280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000072c0)={{{@in=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000073c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007580)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000075c0)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000076c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007700)={@mcast1}, &(0x7f0000007740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007cc0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007f00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007f40)={'erspan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008540)={&(0x7f0000000340), 0xc, &(0x7f0000008500)={&(0x7f0000007f80)={0x14}, 0x14}}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.capability\x00') syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) [ 589.012599] audit: type=1326 audit(2000000098.444:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=17766 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:58 executing program 3: clone(0x200, &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/159) socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, 0xfffffffffffffffe) 03:34:58 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e80)={@remote}, &(0x7f0000006ec0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007040), 0x0, 0x0, &(0x7f0000007080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000007280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000072c0)={{{@in=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000073c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007580)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000075c0)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000076c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007700)={@mcast1}, &(0x7f0000007740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007cc0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007f00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007f40)={'erspan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008540)={&(0x7f0000000340), 0xc, &(0x7f0000008500)={&(0x7f0000007f80)={0x14}, 0x14}}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.capability\x00') syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 03:34:58 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) [ 589.273898] audit: type=1326 audit(2000000098.704:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=17779 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:34:59 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e80)={@remote}, &(0x7f0000006ec0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000007040), 0x0, 0x0, &(0x7f0000007080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007180)={{{@in=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000007280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000072c0)={{{@in=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000073c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007580)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000075c0)={{{@in=@local, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000076c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007700)={@mcast1}, &(0x7f0000007740)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@remote, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000007880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007cc0)={{{@in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007f00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007f40)={'erspan0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008540)={&(0x7f0000000340), 0xc, &(0x7f0000008500)={&(0x7f0000007f80)={0x14}, 0x14}}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) eventfd(0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)) getpgid(0x0) syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='security.capability\x00') syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 03:34:59 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:34:59 executing program 3: clone(0x200, &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/159) socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, 0xfffffffffffffffe) [ 589.615396] audit: type=1326 audit(2000000099.044:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=17790 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:59 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:34:59 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 03:34:59 executing program 3: clone(0x200, &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/159) socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, 0xfffffffffffffffe) 03:34:59 executing program 2: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000440)=""/224) select(0x40, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") pipe2$9p(&(0x7f0000000040), 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000001c0)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000240)="586df75cc63785c4a959af985219f8ac", 0x10) io_setup(0x0, &(0x7f0000000280)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'ip6gre0\x00'}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000340)={0x0, 0x1, 0x6, @link_local}, 0x10) io_submit(0x0, 0x0, &(0x7f0000001bc0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000380)) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000400)) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:34:59 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:34:59 executing program 2: 03:34:59 executing program 2: 03:34:59 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) socket$inet6(0xa, 0x803, 0x8) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:00 executing program 2: 03:35:00 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:00 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:00 executing program 2: 03:35:00 executing program 2: 03:35:00 executing program 2: 03:35:00 executing program 2: 03:35:00 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:00 executing program 2: 03:35:00 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:00 executing program 2: 03:35:01 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) socket$inet6(0xa, 0x803, 0x8) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:01 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:01 executing program 2: 03:35:01 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:01 executing program 2: 03:35:01 executing program 2: 03:35:01 executing program 2: 03:35:01 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:01 executing program 2: 03:35:01 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:01 executing program 2: 03:35:01 executing program 2: 03:35:02 executing program 2: 03:35:02 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) socket$inet6(0xa, 0x803, 0x8) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:02 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:02 executing program 2: 03:35:02 executing program 2: 03:35:02 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:02 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:02 executing program 2: 03:35:02 executing program 2: 03:35:02 executing program 2: 03:35:02 executing program 2: 03:35:02 executing program 2: 03:35:03 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x0, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:03 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:03 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:03 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:03 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:03 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:03 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:04 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:04 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:04 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x0, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:04 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:04 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:35:04 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) 03:35:04 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:05 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:05 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x0, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:05 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:35:05 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) 03:35:05 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:05 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:06 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:06 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:35:06 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:06 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:06 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) 03:35:06 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:06 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:06 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:06 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:07 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:07 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:07 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:07 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:07 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:07 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:07 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:08 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:08 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:08 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:08 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:09 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:09 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:09 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:09 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:09 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488d") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:09 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:09 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:09 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:10 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:10 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:10 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:10 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:10 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:10 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488d") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:10 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:11 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:11 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:11 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:11 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:11 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:11 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:11 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:11 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488d") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:11 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:12 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:12 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:12 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:12 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:12 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:12 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:12 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:12 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:12 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:12 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:13 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:13 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:13 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:13 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:13 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:13 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:13 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:14 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:14 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:14 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:14 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:14 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:14 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:14 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:14 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:14 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:15 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:15 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:15 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:15 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:15 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:15 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:15 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:15 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:15 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:16 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:16 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:16 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:16 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:16 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:16 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:16 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c60") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:16 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:16 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:16 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:17 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:17 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:17 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:17 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:17 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:17 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:17 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c60") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:17 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:18 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:18 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:18 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:18 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:18 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:18 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:18 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:18 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c60") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:19 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:19 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:19 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:19 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:19 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:19 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:19 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:19 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:20 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:20 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:20 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:20 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:20 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:20 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:20 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:20 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:20 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:21 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:21 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:21 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:21 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:21 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:21 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:21 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:21 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:21 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:22 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:22 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:22 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:22 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:22 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:22 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:22 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:22 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:22 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:22 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:23 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:23 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:23 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:23 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:23 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:23 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:23 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:23 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:23 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:23 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:24 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:24 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:24 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:24 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:24 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:24 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:24 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:24 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:24 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:24 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:25 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:25 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:25 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:25 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:25 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:25 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:25 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:25 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:25 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:26 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:26 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:26 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:26 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:26 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:26 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:26 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:26 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:26 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:26 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6(0xa, 0x803, 0x8) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x4000000000003b6, 0x0) 03:35:26 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:27 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:27 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:27 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:27 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:27 executing program 0: syz_emit_ethernet(0xfffd, &(0x7f0000000100)={@broadcast, @remote, [], {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "199ac0f1ca9a7443"}}}}, &(0x7f0000000000)) 03:35:27 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:27 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xfffffe97) fcntl$addseals(r0, 0x409, 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000080), &(0x7f0000000040)) 03:35:27 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:27 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:28 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:28 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:28 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:28 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f00000000c0)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f0000000a00)) 03:35:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:28 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:29 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:29 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:29 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:29 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:29 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:29 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:29 executing program 2: setpriority(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:29 executing program 2: setpriority(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:30 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:30 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:30 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:30 executing program 2: setpriority(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:30 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:30 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:30 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:30 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:30 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:30 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:31 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:31 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:31 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:31 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:31 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:31 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:31 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:31 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:31 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:31 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:31 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:31 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:32 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:32 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:32 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:32 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:32 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:32 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:32 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:32 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:32 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:32 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:32 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 623.327660] audit: type=1326 audit(2000000132.754:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=19051 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:35:32 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:33 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:33 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:33 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) [ 623.706420] audit: type=1326 audit(2000000133.134:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=19065 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:35:33 executing program 2: setpriority(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005f80), 0x0, 0x0, &(0x7f0000006140)) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$inet(0xffffffffffffffff, &(0x7f0000006180)={0x2, 0x0, @rand_addr}, 0x10) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000061c0)={@dev}) recvmsg(0xffffffffffffff9c, &(0x7f00000004c0)={&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000001780)=""/224, 0xe0}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001880)={0x0, 0x1, 0x6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000f00), 0x4) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) chdir(&(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[]}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001080)={0x5a, 0x7d, 0x0, {{0x0, 0x41, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '#vboxnet0)', 0x0, "", 0x4, 'fou\x00'}, 0x4, 'fou\x00'}}, 0x5a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000500)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000002d40), 0x0, 0x0, &(0x7f0000002e40)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) [ 623.922208] audit: type=1326 audit(2000000133.354:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=19080 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:35:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x0, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:33 executing program 2: accept4(0xffffffffffffffff, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x37, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) rt_sigaction(0x39, &(0x7f00000001c0)={&(0x7f0000000000)="f083210b8fc8708585e6b70000adf3ab67660f3a44840500d1fec7f26dc55d00c4e19d54a4d700000080260f34c4e265b8ae0041f417", {0x2000000}, 0x0, &(0x7f0000000180)="c4c28da82480c4c37905408c00c4c32922588d16262e26f0814fa0b10500008fe93895f60f72d70b64d9230f1f40e8f30fae2504000000c4e18e5912"}, &(0x7f0000000300)={&(0x7f0000000380)="c4e1a5f88439169989999999e12711f9c4c2f90ab0f2d000003e26f2aac4e1f572f5fec4e1895e760ac4e3d141d1000f01d9fcc4c3016cd306", {}, 0x0, &(0x7f0000000040)="dd098fc97801ba42e0c3050f18ac0fbec000000f6e7ea0c4e20d2b4800f30f11f3ff3167f20f7c03660f57c2f7a6ffefffff"}, 0xfffffe81, &(0x7f0000000340)) 03:35:33 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:33 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000140)='\f', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 03:35:33 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:34 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x0, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:34 executing program 2: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000540), &(0x7f0000000240)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000040)='./file0\x00', 0x841, 0x0) unlink(&(0x7f0000000180)='./file0\x00') ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000003c0)=""/159) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') setxattr(&(0x7f00000000c0)='./file0/file0/file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000240)='.:vboxnet0!keyring#\x00', 0x14, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "750b56fee616dd8291328e7e9a37a9d3324d0dbaeb12d14a19bce8f5dfdee637e2f92aa0016d257247eb7b99936e7cc4c16d73ce3fcdc0d3e2f02cbd2df81e00", "d04e74997d34a2da688565521f8147797a8eb4e643c7d79e4a02ccf23b400c50"}) 03:35:34 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x0, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x1}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x1}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x1}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:34 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x0, 0x0, 0xffffffff}}) 03:35:34 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic}) 03:35:34 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:34 executing program 2: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000540), &(0x7f0000000240)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000040)='./file0\x00', 0x841, 0x0) unlink(&(0x7f0000000180)='./file0\x00') ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000003c0)=""/159) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') setxattr(&(0x7f00000000c0)='./file0/file0/file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000240)='.:vboxnet0!keyring#\x00', 0x14, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "750b56fee616dd8291328e7e9a37a9d3324d0dbaeb12d14a19bce8f5dfdee637e2f92aa0016d257247eb7b99936e7cc4c16d73ce3fcdc0d3e2f02cbd2df81e00", "d04e74997d34a2da688565521f8147797a8eb4e643c7d79e4a02ccf23b400c50"}) 03:35:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic}) 03:35:34 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @pic={0x0, 0x3ff}}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic}) 03:35:35 executing program 2: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000540), &(0x7f0000000240)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000040)='./file0\x00', 0x841, 0x0) unlink(&(0x7f0000000180)='./file0\x00') ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000003c0)=""/159) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') setxattr(&(0x7f00000000c0)='./file0/file0/file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000240)='.:vboxnet0!keyring#\x00', 0x14, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "750b56fee616dd8291328e7e9a37a9d3324d0dbaeb12d14a19bce8f5dfdee637e2f92aa0016d257247eb7b99936e7cc4c16d73ce3fcdc0d3e2f02cbd2df81e00", "d04e74997d34a2da688565521f8147797a8eb4e643c7d79e4a02ccf23b400c50"}) 03:35:35 executing program 0: clone(0x1ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r0 = getpid() clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setscheduler(r0, 0x80000000005, &(0x7f0000000080)) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@remote, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1}, &(0x7f0000000140)=0x20) 03:35:35 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:35 executing program 0: setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000340)='/dev/vhci\x00', 0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000005c0)={0x7}, 0xfffffffffffffedd) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000540), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200), 0x4) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000240)=""/83) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) 03:35:35 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:35 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:35 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:36 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) 03:35:36 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:36 executing program 0: setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000340)='/dev/vhci\x00', 0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000005c0)={0x7}, 0xfffffffffffffedd) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000540), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200), 0x4) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000240)=""/83) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) 03:35:36 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:36 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:36 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:36 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) 03:35:37 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:37 executing program 0: setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000340)='/dev/vhci\x00', 0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000005c0)={0x7}, 0xfffffffffffffedd) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000540), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200), 0x4) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000240)=""/83) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) 03:35:37 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:37 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:37 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:37 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) 03:35:38 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:38 executing program 0: setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000340)='/dev/vhci\x00', 0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000005c0)={0x7}, 0xfffffffffffffedd) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000540), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200), 0x4) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000240)=""/83) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) 03:35:38 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:38 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:38 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:38 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:38 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) 03:35:39 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:39 executing program 0: setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000340)='/dev/vhci\x00', 0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000005c0)={0x7}, 0xfffffffffffffedd) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000540), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200), 0x4) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000240)=""/83) 03:35:39 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:39 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:39 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:35:39 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:39 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:40 executing program 0: setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000340)='/dev/vhci\x00', 0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000005c0)={0x7}, 0xfffffffffffffedd) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000540), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200), 0x4) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000240)=""/83) 03:35:40 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:40 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:40 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:35:40 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:40 executing program 0: setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000340)='/dev/vhci\x00', 0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000005c0)={0x7}, 0xfffffffffffffedd) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000540), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200), 0x4) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000240)=""/83) 03:35:41 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:41 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:41 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:41 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:35:41 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:41 executing program 0: setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000340)='/dev/vhci\x00', 0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000005c0)={0x7}, 0xfffffffffffffedd) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000540), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200), 0x4) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) 03:35:41 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:42 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:42 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:42 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) 03:35:42 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:42 executing program 0: setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000340)='/dev/vhci\x00', 0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000005c0)={0x7}, 0xfffffffffffffedd) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000540), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200), 0x4) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) 03:35:42 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:43 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:43 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:43 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) 03:35:43 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:43 executing program 0: setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000340)='/dev/vhci\x00', 0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000005c0)={0x7}, 0xfffffffffffffedd) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000540), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200), 0x4) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) 03:35:43 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:44 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:44 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:44 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) 03:35:44 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:44 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:44 executing program 0: setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000340)='/dev/vhci\x00', 0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000005c0)={0x7}, 0xfffffffffffffedd) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000540), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200), 0x4) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000240)=""/83) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) 03:35:44 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:45 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:45 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) 03:35:45 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:45 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) 03:35:45 executing program 0: setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000340)='/dev/vhci\x00', 0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000005c0)={0x7}, 0xfffffffffffffedd) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000540), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200), 0x4) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000240)=""/83) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) 03:35:45 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) inotify_init() ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:45 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) 03:35:45 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:45 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) getpgid(0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) 03:35:46 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:46 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) getpgid(0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) 03:35:46 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) getpgid(0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) 03:35:46 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:47 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) 03:35:47 executing program 0: setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000340)='/dev/vhci\x00', 0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000005c0)={0x7}, 0xfffffffffffffedd) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000540), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200), 0x4) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000240)=""/83) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) 03:35:47 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:35:47 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:47 executing program 5: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:47 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) [ 638.048801] INFO: task syz-executor1:14183 blocked for more than 140 seconds. [ 638.062927] Not tainted 4.19.0-rc3+ #13 [ 638.081118] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 638.117098] syz-executor1 D23160 14183 14181 0x00000000 [ 638.142306] Call Trace: [ 638.152811] __schedule+0x86c/0x1ed0 [ 638.170198] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 638.190046] ? __sched_text_start+0x8/0x8 [ 638.208735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 638.232482] ? futex_wait_queue_me+0x55d/0x840 [ 638.251670] ? refill_pi_state_cache.part.9+0x320/0x320 [ 638.270458] ? print_usage_bug+0xc0/0xc0 [ 638.283709] ? do_raw_spin_lock+0xc1/0x200 [ 638.298089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 638.316305] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 638.333849] ? futex_wait_setup+0x266/0x3e0 [ 638.346232] ? graph_lock+0x170/0x170 [ 638.359108] schedule+0xfe/0x460 [ 638.371420] ? __schedule+0x1ed0/0x1ed0 [ 638.401286] ? find_held_lock+0x36/0x1c0 [ 638.416675] ? mark_held_locks+0xc7/0x130 [ 638.434406] schedule_timeout+0x1cc/0x260 [ 638.453180] ? usleep_range+0x1a0/0x1a0 [ 638.466253] ? __ldsem_down_read_nested+0x4e3/0xb80 [ 638.482591] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 638.498713] ? kasan_check_write+0x14/0x20 [ 638.513244] ? do_raw_spin_lock+0xc1/0x200 [ 638.526564] __ldsem_down_read_nested+0x538/0xb80 [ 638.541666] ? ldsem_wake+0x40/0x40 [ 638.554504] ? ___might_sleep+0x1ed/0x300 [ 638.568894] ? find_held_lock+0x36/0x1c0 [ 638.588974] ldsem_down_read+0x32/0x40 [ 638.601905] ? ldsem_down_read+0x32/0x40 [ 638.618340] tty_ldisc_ref_wait+0x25/0x80 03:35:48 executing program 0: setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000340)='/dev/vhci\x00', 0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000005c0)={0x7}, 0xfffffffffffffedd) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000540), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200), 0x4) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000240)=""/83) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) 03:35:48 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:48 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:48 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:48 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) [ 638.640441] tty_ioctl+0x512/0x1820 [ 638.652940] ? tty_vhangup+0x30/0x30 [ 638.667293] ? rcu_bh_qs+0xc0/0xc0 [ 638.677967] ? __fget+0x4d1/0x740 03:35:48 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") [ 638.707259] ? ksys_dup3+0x680/0x680 [ 638.755380] ? __fget_light+0x2e9/0x430 [ 638.796579] ? fget_raw+0x20/0x20 [ 638.819147] ? tty_vhangup+0x30/0x30 [ 638.829490] do_vfs_ioctl+0x1de/0x1720 [ 638.847395] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 638.864410] ? fput+0x130/0x1a0 [ 638.872503] ? ioctl_preallocate+0x300/0x300 [ 638.884788] ? memset+0x31/0x40 [ 638.896707] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 638.928781] ? smack_file_ioctl+0x210/0x3c0 [ 638.935230] ? fget_raw+0x20/0x20 [ 638.942866] ? smack_file_lock+0x2e0/0x2e0 [ 638.951723] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 638.963023] ? __x64_sys_futex+0x47f/0x6a0 [ 638.974416] ? do_syscall_64+0x9a/0x820 [ 638.993458] ? do_syscall_64+0x9a/0x820 [ 639.004617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 639.021549] ? security_file_ioctl+0x94/0xc0 [ 639.033939] ksys_ioctl+0xa9/0xd0 [ 639.044183] __x64_sys_ioctl+0x73/0xb0 [ 639.059651] do_syscall_64+0x1b9/0x820 [ 639.075542] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 639.101116] ? syscall_return_slowpath+0x5e0/0x5e0 [ 639.122529] ? trace_hardirqs_on_caller+0x310/0x310 [ 639.144352] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 639.167560] ? recalc_sigpending_tsk+0x180/0x180 [ 639.189867] ? kasan_check_write+0x14/0x20 [ 639.207822] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 639.222994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.241142] RIP: 0033:0x4572d9 [ 639.253794] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 639.348291] RSP: 002b:00007f96d24bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 639.389544] RAX: ffffffffffffffda RBX: 00007f96d24bc6d4 RCX: 00000000004572d9 [ 639.420301] RDX: 0000000020000100 RSI: 0000000000005600 RDI: 0000000000000005 [ 639.450924] RBP: 00000000009301e0 R08: 0000000000000000 R09: 0000000000000000 [ 639.480618] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 639.512406] R13: 00000000004d2550 R14: 00000000004c7a92 R15: 0000000000000002 [ 639.545947] [ 639.545947] Showing all locks held in the system: [ 639.577278] 1 lock held by khungtaskd/984: 03:35:49 executing program 0: setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000340)='/dev/vhci\x00', 0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000005c0)={0x7}, 0xfffffffffffffedd) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000540), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200), 0x4) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000240)=""/83) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) 03:35:49 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) lsetxattr(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=@known='system.sockprotoname\x00', &(0x7f00000003c0)='/dev/null\x00', 0xa, 0x0) write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) [ 639.598047] #0: 000000005a27c3ef (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 03:35:49 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) [ 639.658759] 1 lock held by rsyslogd/5271: [ 639.662946] #0: 000000009f0cf050 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 03:35:49 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)="696f2e77656967687400aad17e0aac0cbbd7aca0b97a762f443011da3936865b4a2eb36fe60428a59fa3cf29de207ca15c7ad7a4ad3d78d5380616746ef9b070116a9bab01cd62cb7dbca4a546857013062a7741099eba1e03ddd3d05ea4d0679c81aee5f506e3d6ac6994d1449e5356d0e8c3084814041a21927ad5", 0x2, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:49 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) [ 639.707865] 2 locks held by getty/5362: 03:35:49 executing program 4: rt_sigaction(0x0, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") [ 639.752591] #0: 00000000944970ca (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 639.785558] #1: 00000000ace5f5b8 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 639.814206] 2 locks held by getty/5363: [ 639.823490] #0: 00000000f67cc48b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 639.842056] #1: 000000006af39316 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 03:35:49 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) [ 639.861256] 2 locks held by getty/5364: [ 639.872661] #0: 00000000fa64dd54 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 639.897918] #1: 0000000039e9c29c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 639.927424] 2 locks held by getty/5365: [ 639.946094] #0: 0000000009eaf7b1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 03:35:49 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) [ 639.976470] #1: 00000000462eb34a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 640.008142] 2 locks held by getty/5366: [ 640.022660] #0: 00000000c2c43001 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 640.053329] #1: 0000000005b6f53b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 640.090504] 2 locks held by getty/5367: 03:35:49 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) [ 640.109674] #0: 00000000e9cbd186 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 640.148433] #1: 000000000b985586 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 640.200093] 2 locks held by getty/5368: [ 640.222346] #0: 0000000066a26e32 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 640.262369] #1: 0000000022e974aa (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 03:35:49 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) [ 640.304312] 2 locks held by syz-executor5/10908: [ 640.334683] #0: 000000002c0b1853 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 640.369481] #1: 0000000003e7c13e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 640.405578] 2 locks held by syz-executor1/14182: [ 640.423267] #0: 00000000ac16aadd (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 640.454326] #1: 000000002a208475 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 640.487316] 1 lock held by syz-executor1/14183: [ 640.504953] #0: 00000000ac16aadd (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 640.537014] 2 locks held by syz-executor1/14251: 03:35:50 executing program 0: setxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=ANY=[], &(0x7f0000000340)='/dev/vhci\x00', 0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000005c0)={0x7}, 0xfffffffffffffedd) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000540), 0x4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000200), 0x4) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000240)=""/83) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) [ 640.555710] #0: 0000000087d7d6c3 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 03:35:50 executing program 1: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") getuid() geteuid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) geteuid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000940)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[], 0x0, 0x0) 03:35:50 executing program 3: msgget(0x3, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000500)=0xe8) openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000a00), &(0x7f0000000a40)=0x30) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000540)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='highspeed\x00', 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000580)) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000001c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)) symlink(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='./file0\x00') ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000980)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000008c0)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000780)=""/195, &(0x7f0000000880)=0xc3) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) 03:35:50 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) 03:35:50 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) [ 640.610688] #1: 00000000de1f1103 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 03:35:50 executing program 4: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000240)='team0\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") [ 640.682230] 2 locks held by syz-executor3/14799: [ 640.687041] #0: 00000000997a1975 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 640.768787] #1: 0000000086ca133f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 03:35:50 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) [ 640.812612] [ 640.819609] ============================================= [ 640.819609] [ 640.853130] NMI backtrace for cpu 1 [ 640.856890] CPU: 1 PID: 984 Comm: khungtaskd Not tainted 4.19.0-rc3+ #13 [ 640.863762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 640.873137] Call Trace: [ 640.875753] dump_stack+0x1c4/0x2b4 [ 640.879404] ? dump_stack_print_info.cold.2+0x52/0x52 [ 640.884618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 640.890444] nmi_cpu_backtrace.cold.3+0x63/0xa2 [ 640.895137] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 640.900348] nmi_trigger_cpumask_backtrace+0x1b3/0x1ed [ 640.905655] arch_trigger_cpumask_backtrace+0x14/0x20 [ 640.910866] watchdog+0xb3e/0x1050 [ 640.914437] ? reset_hung_task_detector+0xd0/0xd0 [ 640.919306] ? __kthread_parkme+0xce/0x1a0 [ 640.923576] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 640.928731] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 640.933872] ? lockdep_hardirqs_on+0x421/0x5c0 [ 640.938482] ? trace_hardirqs_on+0xbd/0x310 [ 640.942828] ? kasan_check_read+0x11/0x20 [ 640.947091] ? __kthread_parkme+0xce/0x1a0 [ 640.951352] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 640.956835] ? kasan_check_write+0x14/0x20 [ 640.961102] ? do_raw_spin_lock+0xc1/0x200 [ 640.965373] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 640.970501] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 640.976072] ? __kthread_parkme+0xfb/0x1a0 [ 640.980332] kthread+0x35a/0x420 [ 640.983717] ? reset_hung_task_detector+0xd0/0xd0 [ 640.988585] ? kthread_bind+0x40/0x40 [ 640.992406] ret_from_fork+0x3a/0x50 [ 640.996503] Sending NMI from CPU 1 to CPUs 0: [ 641.001403] NMI backtrace for cpu 0 [ 641.001410] CPU: 0 PID: 19583 Comm: syz-executor1 Not tainted 4.19.0-rc3+ #13 [ 641.001418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 641.001422] RIP: 0010:write_comp_data+0x22/0x70 [ 641.001436] Code: 90 90 90 90 90 90 90 90 55 65 4c 8b 04 25 40 ee 01 00 65 8b 05 ff 1d 83 7e a9 00 01 1f 00 48 89 e5 75 51 41 8b 80 d0 12 00 00 <83> f8 03 75 45 49 8b 80 d8 12 00 00 45 8b 80 d4 12 00 00 4c 8b 08 [ 641.001440] RSP: 0018:ffff88013af6fe30 EFLAGS: 00000046 03:35:50 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180), 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(0xffffffffffffffff, 0x40086432, &(0x7f00000001c0)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) write$9p(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000000c0), 0x4) [ 641.001450] RAX: 0000000000000002 RBX: 1ffff100275edfcd RCX: ffffffff8184e2bd [ 641.001456] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 641.001462] RBP: ffff88013af6fe30 R08: ffff8801c01a2600 R09: 0000000000000000 [ 641.001468] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff87c0009d [ 641.001474] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 641.001480] FS: 00007f96d24fe700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 641.001486] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 03:35:50 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) [ 641.001492] CR2: 0000000000706138 CR3: 00000001c1a3c000 CR4: 00000000001406f0 [ 641.001498] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 641.001504] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 641.001507] Call Trace: [ 641.001512] __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 641.001517] trace_hardirqs_on_caller+0x9d/0x310 [ 641.001521] ? syscall_return_slowpath+0x5e0/0x5e0 [ 641.001526] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 641.001530] ? trace_hardirqs_off+0x310/0x310 [ 641.001535] ? prepare_exit_to_usermode+0x291/0x3b0 [ 641.001540] trace_hardirqs_on_thunk+0x1a/0x1c [ 641.001544] ? do_syscall_64+0x497/0x820 [ 641.001549] entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 641.001552] RIP: 0033:0x4572d9 [ 641.001565] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 641.001570] RSP: 002b:00007f96d24fdcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 641.001580] RAX: fffffffffffff001 RBX: 00000000009300a8 RCX: 00000000004572d9 [ 641.001586] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00000000009300a8 [ 641.001592] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 641.001598] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000009300ac [ 641.001605] R13: 00007ffe161f47bf R14: 00007f96d24fe9c0 R15: 0000000000000000 03:35:50 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000049c0)) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in6=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004c00)=0xe8) lstat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) syz_open_dev$loop(&(0x7f0000004d00)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000004e80)=0xe8) getgroups(0x0, &(0x7f0000004ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000064c0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) [ 641.266761] Kernel panic - not syncing: hung_task: blocked tasks [ 641.273053] CPU: 1 PID: 984 Comm: khungtaskd Not tainted 4.19.0-rc3+ #13 [ 641.279903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 641.289271] Call Trace: [ 641.291877] dump_stack+0x1c4/0x2b4 [ 641.295514] ? dump_stack_print_info.cold.2+0x52/0x52 [ 641.300747] panic+0x238/0x4e7 [ 641.303963] ? add_taint.cold.5+0x16/0x16 [ 641.308135] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 641.313600] ? nmi_trigger_cpumask_backtrace+0x1c4/0x1ed [ 641.319070] ? nmi_trigger_cpumask_backtrace+0x173/0x1ed [ 641.324540] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 641.330007] watchdog+0xb4f/0x1050 [ 641.333566] ? reset_hung_task_detector+0xd0/0xd0 [ 641.338420] ? __kthread_parkme+0xce/0x1a0 [ 641.342675] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 641.347812] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 641.352922] ? lockdep_hardirqs_on+0x421/0x5c0 [ 641.357509] ? trace_hardirqs_on+0xbd/0x310 [ 641.361836] ? kasan_check_read+0x11/0x20 [ 641.365990] ? __kthread_parkme+0xce/0x1a0 [ 641.370249] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 641.375720] ? kasan_check_write+0x14/0x20 [ 641.379974] ? do_raw_spin_lock+0xc1/0x200 [ 641.384240] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 641.389367] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 641.394920] ? __kthread_parkme+0xfb/0x1a0 [ 641.399177] kthread+0x35a/0x420 [ 641.402557] ? reset_hung_task_detector+0xd0/0xd0 [ 641.407419] ? kthread_bind+0x40/0x40 [ 641.411247] ret_from_fork+0x3a/0x50 [ 641.416314] Kernel Offset: disabled [ 641.419958] Rebooting in 86400 seconds..