ffffffffffff, 0x6, 0x13, &(0x7f0000000140), 0xc) 18:14:32 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:33 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:33 executing program 2: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140), 0xc) 18:14:33 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:33 executing program 3: socket$l2tp(0x18, 0x1, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) 18:14:33 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:33 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) 18:14:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:33 executing program 3: socket$l2tp(0x18, 0x1, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:33 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) 18:14:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:34 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:34 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:34 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:34 executing program 3: socket$l2tp(0x18, 0x1, 0x1) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) 18:14:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:34 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) 18:14:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:34 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) 18:14:35 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:35 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:35 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) 18:14:35 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:35 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) 18:14:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:35 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) 18:14:36 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:36 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:36 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 18:14:36 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:36 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) 18:14:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) 18:14:36 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 18:14:36 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:36 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) 18:14:36 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 18:14:36 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:37 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) 18:14:37 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:37 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:37 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:37 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:37 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) 18:14:37 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:38 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:38 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) 18:14:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:38 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140), 0xc) 18:14:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:38 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:38 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:38 executing program 2: 18:14:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:38 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:39 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:39 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:39 executing program 2: 18:14:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:39 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:39 executing program 2: 18:14:39 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:39 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:39 executing program 2: 18:14:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:39 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:39 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:40 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:40 executing program 2: 18:14:40 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000140), 0xc) close(r0) 18:14:40 executing program 2: getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000500)={0x0, 0x0, 0x0, &(0x7f0000000480)}) request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280), &(0x7f00000002c0)='-\x00', 0xfffffffffffffffb) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000680)={@local}, &(0x7f00000006c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000780)={0x0, @empty, @loopback}, &(0x7f00000007c0)=0xc) accept(0xffffffffffffffff, &(0x7f0000000800)=@can, &(0x7f0000000880)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@dev, @dev}, &(0x7f0000000f40)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f80)={@broadcast, @loopback}, &(0x7f0000000fc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast1, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000001100)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001140)={0x0, @local, @broadcast}, &(0x7f0000001180)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0510fef69dc0f01ee0dce41cbff91dd91913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 18:14:40 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x2a5) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x13, &(0x7f0000000140), 0xc) close(0xffffffffffffffff) 18:14:40 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:40 executing program 2: 18:14:40 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[]}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:40 executing program 0: 18:14:40 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:41 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:41 executing program 0: 18:14:41 executing program 2: 18:14:41 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[]}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:41 executing program 0: 18:14:41 executing program 2: 18:14:41 executing program 2: 18:14:41 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:41 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[]}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:41 executing program 0: 18:14:41 executing program 2: 18:14:41 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:42 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:42 executing program 2: 18:14:42 executing program 0: 18:14:42 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB]}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:42 executing program 2: 18:14:42 executing program 0: 18:14:42 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB]}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:42 executing program 2: 18:14:42 executing program 0: 18:14:42 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:42 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB]}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:42 executing program 2: 18:14:43 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:43 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:43 executing program 0: 18:14:43 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001"], 0x30}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:43 executing program 2: 18:14:43 executing program 0: 18:14:43 executing program 2: 18:14:43 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001"], 0x30}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:43 executing program 2: 18:14:43 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:43 executing program 0: 18:14:43 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001"], 0x30}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:43 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:43 executing program 2: 18:14:43 executing program 0: 18:14:43 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000"], 0x48}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:43 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:44 executing program 0: 18:14:44 executing program 2: 18:14:44 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:44 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000"], 0x48}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:44 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:44 executing program 0: 18:14:44 executing program 2: 18:14:44 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000"], 0x48}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:44 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:44 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:44 executing program 0: 18:14:44 executing program 2: 18:14:44 executing program 2: 18:14:44 executing program 0: 18:14:45 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:45 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20"], 0x54}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:45 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:45 executing program 2: 18:14:45 executing program 0: 18:14:45 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:45 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:45 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20"], 0x54}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:45 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:45 executing program 2: 18:14:45 executing program 0: 18:14:45 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xa, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in=@dev={0xac, 0x14, 0x14, 0x19}, @in=@rand_addr, 0x0, 0x10}]}, 0x38}}, 0x0) 18:14:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0xa, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x98) 18:14:45 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:46 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xa, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in=@dev={0xac, 0x14, 0x14, 0x19}, @in=@rand_addr, 0x0, 0x10}]}, 0x38}}, 0x0) 18:14:46 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:46 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20"], 0x54}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x40000000) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x20000) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, &(0x7f0000000300)=0x2) r1 = socket$inet6(0xa, 0x5, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) socket$netlink(0x10, 0x3, 0xf) syz_open_dev$sndpcmp(&(0x7f0000001080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000003000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet6_buf(r1, 0x29, 0x40, &(0x7f0000000f9b), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) write(r0, &(0x7f0000000000)="24cacef1eb970a752c4a3a11bf86c409337ddcce169d429767a07b79e6a4dbdcbcc54b67a1f322d34f08ade785b8a9d946cd88c72d35164bb152ad90c0bfc33a", 0x40) sendto$inet6(r2, &(0x7f0000000100), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x40000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000040)=0x800, 0x8) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x10) write$eventfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000004e22000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf3", 0x43}], 0x1}, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f0000000240)={{0x2, 0x4e21, @multicast1}, {0x306, @random="fbdf6e1f027b"}, 0x46, {0x2, 0x4e22, @multicast2}, 'bpq0\x00'}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r3, 0x800455d1, &(0x7f00000000c0)) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x5, 0x0, 0x9, 0x0, 0x9, 0x1000, 0x4, 0x0, 0x3, 0x9ec6, 0x1, 0x2, 0x9, 0x5, 0x85, 0xffffffff00000000, 0x79c, 0xfffffffffffffff7, 0x1f, 0xf93, 0x1, 0x1f, 0x1, 0x136, 0x3, 0x2, 0xe77, 0x5, 0x2, 0x3, 0x9, 0x8000, 0xffffffff, 0x9, 0x527, 0x0, 0x8, 0x1, @perf_bp={&(0x7f00000002c0), 0x1}, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x75b, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x9) [ 169.290633] hrtimer: interrupt took 67326 ns [ 169.417155] IPVS: ftp: loaded support on port[0] = 21 18:14:46 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:46 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:46 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'gre0\x00', &(0x7f0000000280)=@ethtool_gfeatures}) 18:14:46 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000"], 0x5a}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:46 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:46 executing program 2: creat(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000480)=""/254) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000300)={0x47, 0x7d, 0x0, {0x0, 0x40, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, "", 0x4, 'sip\x00', 0x5, 'IPVS\x00', 0x4, 'sip\x00'}}, 0x47) accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:46 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000"], 0x5a}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 169.902131] IPVS: ftp: loaded support on port[0] = 21 18:14:47 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:47 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000"], 0x5a}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:47 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") [ 170.208716] audit: type=1326 audit(1536603287.218:2): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6750 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:14:47 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000"], 0x5d}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:48 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000"], 0x5d}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:48 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:48 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000bc0)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0x2}) 18:14:48 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:48 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x40000000) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x20000) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, &(0x7f0000000300)=0x2) r1 = socket$inet6(0xa, 0x5, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) socket$netlink(0x10, 0x3, 0xf) syz_open_dev$sndpcmp(&(0x7f0000001080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000003000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet6_buf(r1, 0x29, 0x40, &(0x7f0000000f9b), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) write(r0, &(0x7f0000000000)="24cacef1eb970a752c4a3a11bf86c409337ddcce169d429767a07b79e6a4dbdcbcc54b67a1f322d34f08ade785b8a9d946cd88c72d35164bb152ad90c0bfc33a", 0x40) sendto$inet6(r2, &(0x7f0000000100), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x40000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000040)=0x800, 0x8) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x10) write$eventfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000004e22000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf3", 0x43}], 0x1}, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f0000000240)={{0x2, 0x4e21, @multicast1}, {0x306, @random="fbdf6e1f027b"}, 0x46, {0x2, 0x4e22, @multicast2}, 'bpq0\x00'}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r3, 0x800455d1, &(0x7f00000000c0)) perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x5, 0x0, 0x9, 0x0, 0x9, 0x1000, 0x4, 0x0, 0x3, 0x9ec6, 0x1, 0x2, 0x9, 0x5, 0x85, 0xffffffff00000000, 0x79c, 0xfffffffffffffff7, 0x1f, 0xf93, 0x1, 0x1f, 0x1, 0x136, 0x3, 0x2, 0xe77, 0x5, 0x2, 0x3, 0x9, 0x8000, 0xffffffff, 0x9, 0x527, 0x0, 0x8, 0x1, @perf_bp={&(0x7f00000002c0), 0x1}, 0x0, 0x0, 0xfffffffffffffffc, 0x4, 0x75b, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x9) [ 171.876811] audit: type=1326 audit(1536603288.886:3): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6774 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 [ 172.046086] IPVS: ftp: loaded support on port[0] = 21 18:14:49 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000"], 0x5d}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:49 executing program 0: 18:14:49 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100000000000000"], 0x5f}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:49 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:49 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100000000000000"], 0x5f}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:49 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:49 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:14:49 executing program 0: [ 172.982720] audit: type=1326 audit(1536603289.982:4): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6801 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:14:51 executing program 2: 18:14:51 executing program 0: 18:14:51 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e000000100000000000000"], 0x5f}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:51 executing program 1: 18:14:51 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:51 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:52 executing program 1: 18:14:52 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() r1 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x480, 0x0) unlinkat(r1, &(0x7f0000000300)='./file0\x00', 0x200) sched_setscheduler(r0, 0x5, &(0x7f0000000080)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_group_source_req(r2, 0x0, 0x2c, &(0x7f0000000140)={0x7ff, {{0x2, 0x4e22}}, {{0x2, 0x4e22, @multicast1}}}, 0x108) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) 18:14:52 executing program 2: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x181802, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000280)={0x0, @remote, 0x0, 0x0, 'sh\x00', 0x2}, 0x2c) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@local, @in6=@local, 0x4e22, 0x8001, 0x4e24, 0x0, 0x2, 0xa0, 0x0, 0x0, 0x0, r2}, {0x7fff, 0x80000000, 0x5, 0x6, 0x800, 0x2, 0x800, 0x7cf3ee3c}, {0x5, 0x6, 0x6, 0xfffffffffffffffa}, 0x20, 0x6e6bb6, 0x2, 0x0, 0x0, 0x3}, {{@in=@dev, 0x4d2, 0x7c}, 0xa, @in6, 0x3504, 0x1, 0x1, 0xbc, 0x400, 0xfffffffffffffff7, 0xffffffffffffffff}}, 0xe8) 18:14:52 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:52 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file0\x00', 0x20000, 0x81) accept$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0xffffffb0) 18:14:52 executing program 2: clone(0x802102000ff9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r0 = getpid() openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x10) sched_setscheduler(r0, 0x5, &(0x7f0000000080)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000180)={0x0, 0x0, 0xec0}) openat(r1, &(0x7f0000000100)='./file0\x00', 0x20000, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0xffffffb0) 18:14:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x7}}, 0x6, 0xffff, 0x60, 0x3f, 0x2bcf}, &(0x7f00000004c0)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={r4, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r5, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) splice(r1, &(0x7f0000000100)=0x2c, r0, &(0x7f00000001c0), 0x0, 0x6) 18:14:52 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file0\x00', 0x20000, 0x81) accept$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0xffffffb0) 18:14:52 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:52 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file0\x00', 0x20000, 0x81) accept$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0xffffffb0) 18:14:52 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:52 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:52 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file0\x00', 0x20000, 0x81) accept$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0xffffffb0) 18:14:52 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:52 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:52 executing program 0: clone(0x100000000007fd, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffe, 0xffffffffffffffff) r0 = getpid() pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000180)) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000280)) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='.\x00') ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) 18:14:53 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:53 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x7}}, 0x6, 0xffff, 0x60, 0x3f, 0x2bcf}, &(0x7f00000004c0)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={r4, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r5, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) splice(r1, &(0x7f0000000100)=0x2c, r0, &(0x7f00000001c0), 0x0, 0x6) 18:14:53 executing program 0: clone(0x100000000007fd, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffe, 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'ipddp0\x00', &(0x7f0000000240)=@ethtool_regs={0x4, 0xff}}) renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='.\x00') 18:14:53 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:53 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000280)={0x0, @remote, 0x0, 0x0, 'sh\x00', 0x2}, 0x2c) accept$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0xffffffb0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 18:14:53 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:53 executing program 5: setrlimit(0x0, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:53 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000004700)=[{{&(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000028c0), 0x0, &(0x7f0000002980)=""/215, 0xd7}}], 0x1, 0x0, &(0x7f0000004840)={0x0, 0x989680}) sendmsg$nl_route_sched(r0, &(0x7f0000004ec0)={&(0x7f0000004b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@deltaction={0x14, 0x31, 0x1}, 0x14}}, 0x0) dup3(r0, r1, 0x0) getsockopt$sock_int(r1, 0x1, 0x27, &(0x7f0000000100), &(0x7f0000000140)=0x4) 18:14:53 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:53 executing program 2: socket$inet6(0xa, 0x1020000000002, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:53 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:53 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000280)={0x7ff, 0x1000}) ptrace$setopts(0x41fe, 0x0, 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x2000000) write(0xffffffffffffffff, &(0x7f0000000600), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) getpid() 18:14:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x7}}, 0x6, 0xffff, 0x60, 0x3f, 0x2bcf}, &(0x7f00000004c0)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={r4, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r5, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) splice(r1, &(0x7f0000000100)=0x2c, r0, &(0x7f00000001c0), 0x0, 0x6) 18:14:54 executing program 2: socket$inet6(0xa, 0x1020000000002, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:54 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) select(0x40, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x3, 0x800}, &(0x7f0000000040)={0x4, 0x0, 0x0, 0x8, 0x1ff, 0x8, 0x401}, &(0x7f0000000200)={0x0, 0x8, 0x0, 0x4, 0x2, 0x80000000, 0xe8d}, &(0x7f0000000240)={0x0, 0x2710}) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) r1 = accept$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0xffffffb0) geteuid() write$cgroup_pid(r1, &(0x7f0000000280)=r0, 0x12) setpriority(0x2, r0, 0xd109) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @dev}}, 0x0, 0x0, 0x0, "7ae12692fe817af0c7d8e73ca56fc71fb3463389f3700e34eb71df2226e0aa2b8b7ef3fcf0e1e623cf80fe4082965895ce5d756be88cd073ef1ea0845fc3eed1c0d5b3185591da47634c926be7122e06"}, 0xd8) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) write(r1, &(0x7f0000000600)="a724e883132322a113a220db7b0fc12dbb77b8d7256d8019279a5289461c5d089ff143efb3350488a72824f95f9fe097111fb2d49ac800e49d1871231abfad57d30c7e123f32a04699180e1c32a1728fbd798c969b2b57f299168f718cecde24825db332ff903c5e12a24c0fca0e5c26533c9159c23ebf4d3463b2fc04", 0x7d) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}}, 0x10) 18:14:54 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000333f88)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8ffffff0000000200000000030005000000000002004e20e00000010000000000000000"], 0x60}}, 0x0) sendmsg$key(r1, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:14:54 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:54 executing program 5: setrlimit(0x0, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000100), 0xc, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001500050000000000002000000100000014001200fe800000000000000000000000000000"], 0x1}}, 0x0) 18:14:54 executing program 2: socket$inet6(0xa, 0x1020000000002, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:54 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x0, 0x0) r0 = timerfd_create(0x0, 0x0) r1 = dup(r0) sendmsg$unix(r1, &(0x7f0000000300)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f00000001c0)="91cc5c994e", 0x5}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="140000000100000001000000c4d9ff7966ba000000", @ANYRES32=r0], 0x19}, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) fgetxattr(r0, &(0x7f0000000080)=@random={'os2.', '$\x00'}, &(0x7f0000000400), 0x392) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000440)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x100000001, @empty, 0x3}, 0x1c) 18:14:54 executing program 0: r0 = timerfd_create(0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) fgetxattr(r0, &(0x7f0000000080)=@known='security.SMACK64IPOUT\x00', &(0x7f0000000140), 0x0) 18:14:54 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x0, 0x0) r0 = timerfd_create(0x0, 0x0) r1 = dup(r0) sendmsg$unix(r1, &(0x7f0000000300)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f00000001c0)="91cc5c994e", 0x5}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="140000000100000001000000c4d9ff7966ba000000", @ANYRES32=r0], 0x19}, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) fgetxattr(r0, &(0x7f0000000080)=@random={'os2.', '$\x00'}, &(0x7f0000000400), 0x392) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000440)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x100000001, @empty, 0x3}, 0x1c) 18:14:54 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x7}}, 0x6, 0xffff, 0x60, 0x3f, 0x2bcf}, &(0x7f00000004c0)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={r4, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r5, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) splice(r1, &(0x7f0000000100)=0x2c, r0, &(0x7f00000001c0), 0x0, 0x6) 18:14:55 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) 18:14:55 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:55 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) mq_open(&(0x7f0000000140)="0000eafa0000000000000000", 0xfffffffffffffffd, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0xfffffffffffffffe}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@broadcast, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000240)={'IDLETIMER\x00'}, &(0x7f0000000280)=0x1e) 18:14:55 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:55 executing program 5: setrlimit(0x0, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:55 executing program 3: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) select(0x40, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x3, 0x800}, &(0x7f0000000040)={0x4, 0x0, 0x0, 0x8, 0x1ff, 0x8, 0x401}, &(0x7f0000000200)={0x0, 0x8, 0x0, 0x4, 0x2, 0x80000000, 0xe8d}, &(0x7f0000000240)={0x0, 0x2710}) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) r1 = accept$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0xffffffb0) geteuid() setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @dev}}, 0x0, 0x0, 0x0, "7ae12692fe817af0c7d8e73ca56fc71fb3463389f3700e34eb71df2226e0aa2b8b7ef3fcf0e1e623cf80fe4082965895ce5d756be88cd073ef1ea0845fc3eed1c0d5b3185591da47634c926be7122e06"}, 0xd8) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) write(r1, &(0x7f0000000600)="a724e883132322a113a220db7b0fc12dbb77b8d7256d8019279a5289461c5d089ff143efb3350488a72824f95f9fe097111fb2d49ac800e49d1871231abfad57d30c7e123f32a04699180e1c32a1728fbd798c969b2b57f299168f718cecde24825db332ff903c5e12a24c0fca0e5c26533c9159c23ebf4d3463b2fc04", 0x7d) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}}, 0x10) 18:14:55 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) 18:14:55 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:55 executing program 3: syz_open_pts(0xffffffffffffff9c, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x2) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000180), &(0x7f00000001c0)=0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000014c0)={{{@in=@multicast1, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000015c0)) geteuid() lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getuid() lstat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)) fstat(0xffffffffffffffff, &(0x7f0000000280)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) geteuid() 18:14:55 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) 18:14:55 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x7}}, 0x6, 0xffff, 0x60, 0x3f, 0x2bcf}, &(0x7f00000004c0)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={r4, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r5, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:14:56 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) 18:14:56 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:56 executing program 3: syz_open_pts(0xffffffffffffff9c, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x2) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000180), &(0x7f00000001c0)=0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000014c0)={{{@in=@multicast1, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000015c0)) geteuid() lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getuid() 18:14:56 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:56 executing program 0: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2c, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) 18:14:56 executing program 3: syz_open_pts(0xffffffffffffff9c, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x2) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000180), &(0x7f00000001c0)=0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000014c0)={{{@in=@multicast1, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000015c0)) geteuid() lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getuid() lstat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)) fstat(0xffffffffffffffff, &(0x7f0000000280)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) geteuid() getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d00)={{{@in6=@mcast1, @in6}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000001e00)=0xe8) 18:14:56 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:56 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:56 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:56 executing program 0: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2c, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) 18:14:56 executing program 3: syz_open_pts(0xffffffffffffff9c, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x2) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000180), &(0x7f00000001c0)=0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000014c0)={{{@in=@multicast1, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000015c0)) geteuid() lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getuid() lstat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)) fstat(0xffffffffffffffff, &(0x7f0000000280)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) geteuid() getgid() 18:14:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x7}}, 0x6, 0xffff, 0x60, 0x3f, 0x2bcf}, &(0x7f00000004c0)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={r4, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r5, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:14:57 executing program 2: socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:57 executing program 0: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2c, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) 18:14:57 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:57 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:57 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) getegid() syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:14:57 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:57 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) 18:14:57 executing program 2: socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:57 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:57 executing program 2: socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:57 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) 18:14:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x7}}, 0x6, 0xffff, 0x60, 0x3f, 0x2bcf}, &(0x7f00000004c0)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={r4, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r5, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:14:58 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:58 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:58 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) 18:14:58 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:58 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) getegid() syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:14:58 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:58 executing program 0: socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2c, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) 18:14:58 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:58 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:58 executing program 0: socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2c, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) 18:14:58 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x7}}, 0x6, 0xffff, 0x60, 0x3f, 0x2bcf}, &(0x7f00000004c0)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) 18:14:59 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:59 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:59 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:59 executing program 0: socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2c, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) 18:14:59 executing program 3: syz_open_pts(0xffffffffffffff9c, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x2) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000180), &(0x7f00000001c0)=0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000014c0)={{{@in=@multicast1, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000015c0)) geteuid() 18:14:59 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:14:59 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:59 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:14:59 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) 18:14:59 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:14:59 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) [ 182.965255] audit: type=1326 audit(1536603299.975:5): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7226 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast1, 0x7}}, 0x6, 0xffff, 0x60, 0x3f, 0x2bcf}, &(0x7f00000004c0)=0x98) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={r4, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {0x0, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:00 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) 18:15:00 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:00 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:15:00 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:15:00 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) 18:15:00 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:00 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:15:00 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:00 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:15:00 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) 18:15:00 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) [ 183.965734] audit: type=1326 audit(1536603300.973:6): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7263 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:01 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:01 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:15:01 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:15:01 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:15:01 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:01 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:01 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:15:01 executing program 5: setrlimit(0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000380)) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f0000000280)=""/61, 0x3d) creat(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setxattr(&(0x7f0000000040)='\x00', &(0x7f0000000140)=@known='security.SMACK64IPIN\x00', &(0x7f0000000180)='GPL&lo-{@$.ppp0*vboxnet0]keyringmd5sum{\x00', 0x28, 0x0) [ 184.952405] audit: type=1326 audit(1536603301.962:7): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7299 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:02 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x0, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:15:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r2, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:02 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:02 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:15:02 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:02 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:02 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c, 0x1a, 0x201}, 0x1c}}, 0x0) 18:15:02 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c}, 0x1c}}, 0x0) 18:15:02 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r2, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:03 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:03 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c}, 0x1c}}, 0x0) 18:15:03 executing program 2: r0 = socket$inet6(0xa, 0x1020000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x1c}, 0x1c}}, 0x0) 18:15:03 executing program 2: memfd_create(&(0x7f0000000080)="287d256d643573756d65746830766d6e6574302c6d696d655f7479706574727573746564ed00", 0x0) syz_open_pts(0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000480), 0xfffffffffffffcc1) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000180), &(0x7f00000001c0)=0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000014c0)={{{@in=@multicast1, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000015c0)) geteuid() lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getuid() lstat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) geteuid() getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d00)={{{@in6=@mcast1, @in6}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000001e00)=0xe8) getresgid(&(0x7f0000001e40), &(0x7f0000001e80), &(0x7f0000001ec0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001f00)={{{@in=@multicast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000002000)=0xe8) 18:15:03 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:03 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:03 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r3, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:04 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:04 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:04 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:04 executing program 2: memfd_create(&(0x7f0000000080)="287d256d643573756d65746830766d6e6574302c6d696d655f7479706574727573746564ed00", 0x0) syz_open_pts(0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000480), 0xfffffffffffffcc1) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000180), &(0x7f00000001c0)=0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000014c0)={{{@in=@multicast1, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000015c0)) geteuid() lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getuid() lstat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) geteuid() getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d00)={{{@in6=@mcast1, @in6}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000001e00)=0xe8) getresgid(&(0x7f0000001e40), &(0x7f0000001e80), &(0x7f0000001ec0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001f00)={{{@in=@multicast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000002000)=0xe8) 18:15:04 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:05 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') exit(0x0) sendfile(r0, r0, &(0x7f0000000080), 0x800) 18:15:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r3, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:05 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:05 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:05 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:05 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:06 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') exit(0x0) sendfile(r0, r0, &(0x7f0000000080), 0x800) 18:15:06 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:06 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:06 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:06 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 18:15:06 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') exit(0x0) sendfile(r0, r0, &(0x7f0000000080), 0x800) 18:15:07 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:07 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 18:15:07 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:07 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 18:15:07 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:07 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:07 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:07 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:07 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:07 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:07 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') exit(0x0) sendfile(r0, r0, &(0x7f0000000080), 0x800) 18:15:07 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:08 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)={@remote, 0x64, r2}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r3, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:08 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:08 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:08 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:08 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:08 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:08 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:08 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:08 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:08 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') sendfile(r0, r0, &(0x7f0000000080), 0x800) 18:15:08 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:08 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)={@remote, 0x64, r2}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r3, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:09 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:09 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:09 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:09 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') sendfile(r0, r0, &(0x7f0000000080), 0x800) 18:15:09 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:09 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:09 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:09 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:09 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') sendfile(r0, r0, &(0x7f0000000080), 0x800) 18:15:09 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:09 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)={@remote, 0x64, r2}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r3, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:10 executing program 2: exit(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x800) 18:15:10 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:10 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:10 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:10 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:10 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:10 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:10 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:10 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:10 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:10 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:11 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:11 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:11 executing program 2: exit(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x800) [ 194.049057] audit: type=1326 audit(1536603311.059:8): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7607 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 [ 194.097865] audit: type=1326 audit(1536603311.092:9): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7610 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:11 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") 18:15:11 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) [ 194.251127] audit: type=1326 audit(1536603311.261:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7618 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:11 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:11 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:11 executing program 4: sysinfo(&(0x7f00000001c0)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) syz_open_procfs(0x0, &(0x7f0000001440)='auxv\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000012c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "2eff54b13c39603d2017e299f6f4b47d8c4871c940e7d7dc3a91551ec17088e275a450ca4b29e82064c2615c9f0107d359ca256f7622cff1258c799982bc84783f44da4df875a8735d96aa8a50884d4a"}, 0xd8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4096) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000013c0)='trusted.overlay.opaque\x00', &(0x7f0000001400)='y\x00', 0x2, 0x0) open(&(0x7f00000014c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000015c0)="428055a06b6969ef69dc00d990c4e2e999ee7c2a060f38211a40a564a741dfe0400f01efe5e5b441754545a1fde6e62e1a1ac4828d9ab3ca23000001ee36670facb4c500000000799fc4811df136") [ 194.525133] audit: type=1326 audit(1536603311.535:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7635 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:11 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:11 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:11 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000080), &(0x7f0000000ff8)={&(0x7f0000000ff8)={0x9}, 0x8}) getegid() 18:15:11 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:11 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000002c0), 0x8) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000180), &(0x7f00000001c0)=0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ab8b50109641e1e31a3b744dbe271fb26f00fbb9500000000") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000014c0)={{{@in=@multicast1, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000015c0)) geteuid() lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getuid() lstat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 18:15:11 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:11 executing program 2: exit(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x800) [ 195.045905] audit: type=1326 audit(1536603312.055:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7657 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:12 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:12 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:12 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000002c0), 0x8) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000180), &(0x7f00000001c0)=0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000200)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ab8b50109641e1e31a3b744dbe271fb26f00fbb9500000000") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000014c0)={{{@in=@multicast1, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000015c0)) geteuid() lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getuid() 18:15:12 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:12 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:12 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:12 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") [ 195.864779] audit: type=1326 audit(1536603312.874:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7694 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:12 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='{cgroup%lo\x00'}, 0xffffffffffffff9d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 18:15:12 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') exit(0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000080), 0x800) [ 196.049761] audit: type=1326 audit(1536603313.058:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7700 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:13 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:13 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:13 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") [ 196.761540] audit: type=1326 audit(1536603313.771:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7721 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:13 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') exit(0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000080), 0x800) 18:15:13 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:14 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:14 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:14 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") [ 197.709222] audit: type=1326 audit(1536603314.719:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7745 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:14 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') exit(0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000080), 0x800) 18:15:15 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:15 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:15 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:15 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:15 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:15 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:15 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:15 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:15 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') exit(0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080), 0x800) 18:15:16 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:16 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:16 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:16 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:16 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:16 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:16 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:16 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') exit(0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080), 0x800) 18:15:16 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:16 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) [ 199.979903] audit: type=1326 audit(1536603316.988:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7825 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:17 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:17 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000380)={@remote, 0x64, r2}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r3, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:17 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') exit(0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080), 0x800) 18:15:17 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:18 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") [ 200.958483] audit: type=1326 audit(1536603317.968:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7852 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:18 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000380)={@remote, 0x64, r2}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r3, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:18 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:18 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:18 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) 18:15:18 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') exit(0x0) sendfile(r0, r0, &(0x7f0000000080), 0x0) 18:15:18 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000380)={@remote, 0x64, r2}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r3, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) [ 201.913140] audit: type=1326 audit(1536603318.923:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7872 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:19 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:19 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:19 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 18:15:19 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 18:15:19 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:19 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') exit(0x0) sendfile(r0, r0, &(0x7f0000000080), 0x0) 18:15:19 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000380)={@remote, 0x64, r2}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r3, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:19 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:20 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:20 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 18:15:20 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:20 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:20 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:20 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:20 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:20 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') exit(0x0) sendfile(r0, r0, &(0x7f0000000080), 0x0) 18:15:21 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:21 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:21 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:21 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:21 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:21 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:21 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/161}, 0xa9, 0x0, 0x800) 18:15:21 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:22 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:22 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:22 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffff9c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) getgroups(0x0, &(0x7f00000000c0)) setfsgid(0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) poll(&(0x7f00000000c0), 0x0, 0x0) 18:15:22 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:22 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:22 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:22 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:23 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:23 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:23 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:23 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:15:23 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:23 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f00000000c0)=@ethtool_ringparam={0x10, 0x0, 0x0, 0x0, 0x0, 0x80000000}}) 18:15:23 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:23 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:23 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 18:15:24 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:24 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:24 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:24 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:24 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:24 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:24 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:24 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 18:15:25 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:25 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:25 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:25 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:25 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:25 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:25 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:25 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 18:15:25 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:26 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:26 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:26 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:26 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:26 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:26 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:26 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:27 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:27 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:27 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc8070031") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:27 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:27 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:27 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:27 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:27 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:27 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) [ 210.721431] audit: type=1326 audit(1536603327.731:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8168 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:27 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) 18:15:27 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:27 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:28 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc8070031") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:28 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:28 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:28 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:28 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:28 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:28 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) 18:15:28 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) [ 211.915725] audit: type=1326 audit(1536603328.923:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8204 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:29 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f8571") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:29 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:29 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:29 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) 18:15:29 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) 18:15:30 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) [ 212.952479] audit: type=1326 audit(1536603329.962:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8232 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:30 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f857150") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:30 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:30 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:30 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:30 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x6d22c2, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) dup2(0xffffffffffffffff, 0xffffffffffffff9c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000001c0)={@rand_addr, @multicast1}, 0x10) getgroups(0x0, &(0x7f00000000c0)) setfsgid(0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0c60fef69dc0f01eece0f933a19fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000652167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 18:15:31 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:31 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:31 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:31 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:31 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:31 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:31 executing program 3: 18:15:32 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:32 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:32 executing program 3: 18:15:32 executing program 3: 18:15:32 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:32 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:32 executing program 3: 18:15:32 executing program 3: 18:15:32 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:32 executing program 3: 18:15:32 executing program 3: 18:15:33 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:33 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:33 executing program 3: 18:15:33 executing program 3: 18:15:33 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:33 executing program 3: 18:15:33 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:33 executing program 3: 18:15:33 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:33 executing program 3: 18:15:33 executing program 3: 18:15:33 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:34 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:34 executing program 3: 18:15:34 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:34 executing program 3: 18:15:34 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:34 executing program 3: 18:15:34 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140), 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:34 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:34 executing program 3: 18:15:34 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:35 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:35 executing program 3: 18:15:35 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:35 executing program 3: 18:15:35 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:35 executing program 3: 18:15:35 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:35 executing program 3: 18:15:35 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:35 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:35 executing program 3: 18:15:35 executing program 3: 18:15:36 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:36 executing program 3: 18:15:36 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:36 executing program 3: getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") inotify_init1(0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) lsetxattr$trusted_overlay_upper(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.upper\x00', &(0x7f0000000340)=ANY=[], 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/169, &(0x7f0000000440)=0xa9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) 18:15:36 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:36 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:36 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:37 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:37 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:37 executing program 3: memfd_create(&(0x7f0000000040)='Kuser}-security^posix_acl_access\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @multicast2, @multicast1}, &(0x7f0000000280)=0x30a) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000140)={'team0\x00'}) add_key(&(0x7f0000000500)="656e6372797074656400408115c0af4b93b9686aa34a29db9761139d0881bd79e1d55f7a0f42bf07b57e433d6e5b40e862e38af6848d6f278dc8a83fd75f93bb0ed792616c9b6442fcbfc027be22e174cf6dd2db2967be52cbbd31f42725e590b6f7ae5a1fa4df3a1b8847b65a04aeae0987e78f56eaaa5c24726754018662b0", &(0x7f0000000440), 0x0, 0xff92, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 18:15:37 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:37 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:37 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:37 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:38 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:38 executing program 3: add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400), &(0x7f0000000440)="86", 0x1, 0xfffffffffffffffc) socketpair$inet6(0xa, 0x0, 0xfffffffffffffffd, &(0x7f0000000540)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) add_key(&(0x7f0000000700)='asymmetric\x00', &(0x7f0000000740), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0), 0x0, 0x0) pipe2(&(0x7f0000000040), 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x77359400}}, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe2}]}) syz_execute_func(&(0x7f00000019c0)="42805da0d1c4427d13380f01ee660f3a608600088041cb913591913d06290077b478993d233d23410feefa6b2179660f38302f660f3adf03cb2e470f9b243c40697907ffffffffc44379dfb9d6adbe90dfe2989f7f") 18:15:38 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:38 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:38 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:38 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:39 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)) 18:15:39 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)) 18:15:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)) 18:15:39 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)) 18:15:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)) 18:15:39 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)) 18:15:39 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:40 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)) 18:15:40 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:40 executing program 3: ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000300)) 18:15:40 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:40 executing program 3: ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000300)) 18:15:40 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:40 executing program 3: ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000300)) 18:15:40 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:40 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:40 executing program 3: syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000300)) 18:15:41 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:41 executing program 3: syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000300)) 18:15:41 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:41 executing program 3: syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000300)) 18:15:41 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:41 executing program 3: 18:15:41 executing program 3: 18:15:41 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:41 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:41 executing program 3: 18:15:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:42 executing program 3: 18:15:42 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:42 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:42 executing program 3: 18:15:42 executing program 3: 18:15:42 executing program 3: 18:15:42 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:42 executing program 3: 18:15:42 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:43 executing program 3: 18:15:43 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:43 executing program 3: 18:15:43 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:43 executing program 3: 18:15:43 executing program 3: 18:15:43 executing program 3: 18:15:43 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:43 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:43 executing program 3: 18:15:43 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:44 executing program 3: 18:15:44 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6}]}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:44 executing program 3: 18:15:44 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:44 executing program 3: 18:15:44 executing program 3: 18:15:44 executing program 3: 18:15:44 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:44 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:44 executing program 3: 18:15:44 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:45 executing program 3: 18:15:45 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:45 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:45 executing program 3: 18:15:45 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:45 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:45 executing program 3: 18:15:45 executing program 3: 18:15:45 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:45 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:45 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:45 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:45 executing program 3: 18:15:46 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:46 executing program 3: 18:15:46 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:46 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:46 executing program 3: 18:15:46 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:46 executing program 3: 18:15:46 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:46 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:46 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:46 executing program 3: 18:15:46 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:47 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:47 executing program 3: 18:15:47 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") [ 230.296334] audit: type=1326 audit(1536603347.306:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8849 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:47 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:47 executing program 3: 18:15:47 executing program 3: 18:15:47 executing program 3: 18:15:47 executing program 3: 18:15:47 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:47 executing program 3: 18:15:47 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:48 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:48 executing program 3: 18:15:48 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:48 executing program 3: [ 231.277565] audit: type=1326 audit(1536603348.287:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8882 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:48 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:48 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x0, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:48 executing program 3: 18:15:48 executing program 3: 18:15:48 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x0, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:48 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:48 executing program 3: 18:15:48 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:48 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x0, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:49 executing program 3: 18:15:49 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x0, @remote}}) syz_open_pts(0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 18:15:49 executing program 3: [ 232.266442] audit: type=1326 audit(1536603349.274:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8925 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:15:49 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:49 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:49 executing program 3: 18:15:49 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:49 executing program 3: 18:15:49 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:49 executing program 3: 18:15:49 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:50 executing program 3: 18:15:50 executing program 5: 18:15:50 executing program 3: 18:15:50 executing program 5: 18:15:50 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:50 executing program 3: 18:15:50 executing program 5: 18:15:50 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/20, 0x14}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:50 executing program 3: 18:15:50 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:50 executing program 5: 18:15:50 executing program 3: 18:15:50 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:50 executing program 5: 18:15:51 executing program 5: 18:15:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) [ 234.218168] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:15:51 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:51 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) gettid() geteuid() dup3(0xffffffffffffffff, r0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001100)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) write$binfmt_aout(r0, &(0x7f0000000640)={{0x0, 0x0, 0x10000, 0x219, 0x1a4, 0xfff, 0xffffffff, 0x5}, "181b163955478ea709195f8263b08c012b53c7ab372605a8bcf677ae4a768cddc899a7f1f9e04b18285034e9c39edb4797d862582249595643a2ca380a27d36d146636157ec4a4c6a3cd4416b3f4959158380dcdc9355530b6818dfe3b6a5244986b3941338b9ceada9d8e3a633f8572c232d0ad1c88487291f8b7ae84b511db3a82dcf94a6bbc52ace120dfe0e6d645bbdfb410f0b867", [[], [], [], [], [], [], [], [], []]}, 0x9b7) lstat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)) rmdir(&(0x7f00000002c0)='./bus\x00') r1 = creat(&(0x7f0000000200)='./bus\x00', 0x40) ioctl$FS_IOC_RESVSP(r1, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x200000000}) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYRESHEX], 0xa0e87eb3) fdatasync(r1) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000280)) 18:15:51 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:15:51 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/20, 0x14}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:51 executing program 5: r0 = semget$private(0x0, 0x3, 0x0) msgsnd(r0, &(0x7f0000000d40)={0x2}, 0x8, 0x800) 18:15:51 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:51 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:51 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffff9c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) getgroups(0x0, &(0x7f00000000c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@remote, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000440)={0x8b, 0x7d, 0x0, {{0x0, 0x6e, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1c, "a26c6f6d696d655f7479706508656d3176626f786e65743170726f63", 0x17, '.-$^^posix_acl_access[}', 0x5, 'self+', 0x3, '&#]'}, 0x8, 'vboxnet1'}}, 0x8b) setfsgid(0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 18:15:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:15:52 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:52 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000200)=""/20, 0x14}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:52 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:52 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:15:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:15:53 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:53 executing program 5: gettid() getpgid(0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f00000002c0), 0x1, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@remote}, 0x0, @in6}}, 0xe8) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/60) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000500)) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)) getpeername(0xffffffffffffffff, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f00000003c0)=0x14) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) ioperm(0x0, 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000400)=""/214) lseek(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 18:15:53 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:53 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:53 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:15:54 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:54 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:15:54 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:54 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:54 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) socket$inet6(0xa, 0x1000000000001, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:15:55 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:55 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:55 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:55 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:15:55 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) socket$inet6(0xa, 0x1000000000001, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:15:56 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:56 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:56 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:56 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:56 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:15:56 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) socket$inet6(0xa, 0x1000000000001, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:15:57 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:57 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:57 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:15:57 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:57 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:15:58 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:58 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:58 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:58 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) 18:15:58 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:15:59 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:15:59 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) 18:15:59 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:15:59 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:15:59 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:15:59 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) 18:16:00 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:00 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:00 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:16:00 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)={@remote, 0x64, r2}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r3, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:00 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:01 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:01 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:01 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:16:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:01 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x0, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:01 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:02 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:02 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:02 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:16:02 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r3, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:02 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:16:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:02 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:02 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:16:02 executing program 2: clock_getres(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:16:03 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:03 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:03 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:03 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:03 executing program 2: clock_getres(0x0, &(0x7f0000000400)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:16:04 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:04 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:04 executing program 2: clock_getres(0x0, &(0x7f0000000400)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:16:04 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:04 executing program 2: clock_getres(0x0, &(0x7f0000000400)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:16:04 executing program 3: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(0xffffffffffffffff, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:04 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:04 executing program 2: clock_getres(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:16:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:04 executing program 2: clock_getres(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:16:05 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:05 executing program 2: clock_getres(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:16:05 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:05 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:05 executing program 2: clock_getres(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:16:05 executing program 2: clock_getres(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:16:05 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:05 executing program 2: clock_getres(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:16:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:05 executing program 2: clock_getres(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:16:06 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") [ 248.970971] audit: type=1326 audit(1536603365.981:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9444 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:16:06 executing program 2: clock_getres(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) 18:16:06 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) [ 249.219668] audit: type=1326 audit(1536603366.229:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9454 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:16:06 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0x0, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:06 executing program 2: clock_getres(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f00000000c0)='.em1\'trustedeth0system\x00', 0x17, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0), 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) [ 249.455739] audit: type=1326 audit(1536603366.465:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9463 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:16:06 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:06 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:06 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:06 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:07 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:07 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0x0, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:07 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:07 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:07 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:07 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) 18:16:07 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:08 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:08 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0x0, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:08 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x0, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x0, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:08 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) 18:16:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x0, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:09 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x0, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:09 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:09 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:09 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:09 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) 18:16:10 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:10 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:10 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:10 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:10 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") exit_group(0x0) 18:16:11 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:11 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") exit_group(0x0) 18:16:11 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:11 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x0, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:11 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") exit_group(0x0) 18:16:11 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:11 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:12 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:12 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:12 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:12 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:12 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x0, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:12 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:12 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:12 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:12 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:13 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:13 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:13 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:13 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x0, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:13 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:13 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:13 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:13 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:13 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:14 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:14 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:14 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x0, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:14 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:14 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:14 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:14 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:14 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:14 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:15 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:15 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:15 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x0, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) [ 258.303254] audit: type=1326 audit(1536603375.313:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9767 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:16:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:15 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:15 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) [ 258.637075] audit: type=1326 audit(1536603375.647:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9785 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:16:15 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000240)) exit_group(0x0) 18:16:15 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") [ 258.899406] audit: type=1326 audit(1536603375.909:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9793 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 18:16:16 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:16 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x0, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:16 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:16 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:17 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:17 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x0, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:17 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:17 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:17 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:17 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:17 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:17 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:18 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:18 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:18 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x0, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:18 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:18 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:18 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:18 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:18 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:19 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:19 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:19 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x0, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:19 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:19 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:19 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:19 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:19 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:20 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:20 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x0, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:20 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:20 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:21 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:21 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:21 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {0x0, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:21 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488d") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:21 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:21 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:22 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:22 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x0, 0x30d08fe2, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488d") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:22 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:22 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:23 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:23 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x0, @remote, 0x7}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488d") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:23 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 18:16:23 executing program 4: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 18:16:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x4d, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:24 executing program 0: munlockall() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000980)={0x9}, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000900)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth0_to_team\x00', &(0x7f0000000300)=@ethtool_rx_ntuple={0x35, {0x0, @ah_ip4_spec={@dev, @rand_addr}, @sctp_ip4_spec={@empty, @dev}}}}) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000a00)=0xffffffffffffff54) getgid() getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'ip6gre0\x00', @ifru_flags}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) clock_gettime(0x0, &(0x7f00000003c0)) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)) 18:16:24 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000003c0), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@broadcast, @multicast1}, &(0x7f0000000280)=0xc) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x570e}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @broadcast}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000380)={@remote, 0x64, r3}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000540)={0x0, 0x7ff}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0xfffffffffffffff8, 0x5, 0x0, 0x80, 0x5, 0x8001, 0x9, {r4, @in6={{0xa, 0x4e23, 0x30d08fe2, @remote}}, 0x10000, 0x7, 0x393, 0x2, 0xd6}}, &(0x7f0000000680)=0xb0) 18:16:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000c86000), &(0x7f0000000000)=0xffffffffffffff72) 18:16:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000200)={@multicast2, @multicast2, @remote}, 0x8) 18:16:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='hybla\x00', 0x29) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 18:16:24 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001800)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000380), 0x1cb) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") pipe(&(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000300)) futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000005c0)={{}, {0x0, 0x7530}}) clock_gettime(0x0, &(0x7f0000000400)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000b40)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)='ip6gre0\x00'}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000ac0)=0xc) sched_getattr(0x0, &(0x7f0000000940), 0x30, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000540)=0x14, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000580)={@local}, 0x14) syz_open_pts(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000009c0)) syz_open_procfs(0x0, &(0x7f00000000c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000a00)}) clone(0x0, &(0x7f0000001840), &(0x7f0000000200), &(0x7f0000000900), &(0x7f0000000b40)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000a00)={&(0x7f0000fff000/0x1000)=nil, 0x1000}, &(0x7f0000000440)=0xa) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @remote}, @in6=@local}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000840)=0xe8) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000003c0), &(0x7f0000000600), &(0x7f0000000640), &(0x7f00000006c0)={&(0x7f0000000680), 0x8}) socket$inet6(0xa, 0x0, 0x0) close(0xffffffffffffffff) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000700)) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) [ 267.619977] ================================================================== [ 267.627475] BUG: KMSAN: uninit-value in __kmalloc_node_track_caller+0x667/0x1160 [ 267.635026] CPU: 1 PID: 10120 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #43 [ 267.642317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.651686] Call Trace: [ 267.654291] dump_stack+0x14b/0x190 [ 267.657952] kmsan_report+0x183/0x2b0 [ 267.661780] __msan_warning+0x70/0xc0 [ 267.665626] __kmalloc_node_track_caller+0x667/0x1160 [ 267.670907] ? __tcp_send_ack+0x10d/0x880 [ 267.675101] ? __tcp_send_ack+0x10d/0x880 [ 267.679299] __alloc_skb+0x2f5/0x9e0 [ 267.683050] ? __tcp_send_ack+0x10d/0x880 [ 267.687244] __tcp_send_ack+0x10d/0x880 [ 267.691258] tcp_send_ack+0x68/0x90 [ 267.694915] __tcp_ack_snd_check+0x786/0x8e0 [ 267.699380] tcp_rcv_established+0x1b4e/0x2860 [ 267.704013] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 267.709401] tcp_v4_do_rcv+0x689/0xd50 [ 267.713335] ? inet_sk_rx_dst_set+0x290/0x290 [ 267.717868] __release_sock+0x2ae/0x660 [ 267.721876] release_sock+0x99/0x2a0 [ 267.725621] tcp_recvmsg+0x351f/0x4280 [ 267.729618] ? tcp_mmap+0x150/0x150 [ 267.733286] inet_recvmsg+0x4d0/0x5e0 [ 267.737123] ? security_socket_recvmsg+0x1e0/0x220 [ 267.742094] ? inet_sendpage+0x8b0/0x8b0 [ 267.746186] __sys_recvfrom+0x61e/0x7f0 [ 267.750176] ? __msan_poison_alloca+0x173/0x1f0 [ 267.754877] ? prepare_exit_to_usermode+0x46/0x410 [ 267.759828] ? syscall_return_slowpath+0xdb/0x700 [ 267.764735] __se_sys_recvfrom+0x111/0x130 [ 267.769015] __x64_sys_recvfrom+0x6e/0x90 [ 267.773196] do_syscall_64+0xb8/0x100 [ 267.777032] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 267.782236] RIP: 0033:0x4572a9 [ 267.785451] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.804394] RSP: 002b:00007f2f131ebc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 267.812123] RAX: ffffffffffffffda RBX: 00007f2f131ec6d4 RCX: 00000000004572a9 [ 267.819409] RDX: 6478c8501c739e53 RSI: 0000000020f9cf9b RDI: 0000000000000003 [ 267.826705] RBP: 0000000000930140 R08: 0000000000000000 R09: 000000000000004f [ 267.833984] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 267.841288] R13: 00000000004d4498 R14: 00000000004c8ce4 R15: 0000000000000001 [ 267.848603] [ 267.850238] Uninit was created at: [ 267.853817] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 267.858938] kmsan_kmalloc+0x98/0x100 [ 267.862769] kmsan_slab_alloc+0x10/0x20 [ 267.866774] __kmalloc_node_track_caller+0x9e7/0x1160 [ 267.871985] __alloc_skb+0x2f5/0x9e0 [ 267.875718] sk_stream_alloc_skb+0x172/0xc90 [ 267.880159] tcp_write_xmit+0x2677/0xa5a0 [ 267.884342] tcp_tsq_write+0x3ec/0x440 [ 267.888258] tcp_pace_kick+0x115/0x270 [ 267.892175] __hrtimer_run_queues+0xbfc/0x15b0 [ 267.896779] hrtimer_run_softirq+0x1b3/0x2b0 [ 267.901208] __do_softirq+0x562/0x948 [ 267.905026] ================================================================== [ 267.912391] Disabling lock debugging due to kernel taint [ 267.917851] Kernel panic - not syncing: panic_on_warn set ... [ 267.917851] [ 267.925236] CPU: 1 PID: 10120 Comm: syz-executor3 Tainted: G B 4.19.0-rc1+ #43 [ 267.933903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.943267] Call Trace: [ 267.945872] dump_stack+0x14b/0x190 [ 267.949530] panic+0x35d/0x8cb [ 267.952786] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 267.958268] kmsan_report+0x2a8/0x2b0 [ 267.962095] __msan_warning+0x70/0xc0 [ 267.965927] __kmalloc_node_track_caller+0x667/0x1160 [ 267.971141] ? __tcp_send_ack+0x10d/0x880 [ 267.975354] ? __tcp_send_ack+0x10d/0x880 [ 267.979542] __alloc_skb+0x2f5/0x9e0 [ 267.983277] ? __tcp_send_ack+0x10d/0x880 [ 267.987466] __tcp_send_ack+0x10d/0x880 [ 267.991487] tcp_send_ack+0x68/0x90 [ 267.995140] __tcp_ack_snd_check+0x786/0x8e0 [ 267.999588] tcp_rcv_established+0x1b4e/0x2860 [ 268.004226] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 268.009625] tcp_v4_do_rcv+0x689/0xd50 [ 268.013566] ? inet_sk_rx_dst_set+0x290/0x290 [ 268.018098] __release_sock+0x2ae/0x660 [ 268.022126] release_sock+0x99/0x2a0 [ 268.025867] tcp_recvmsg+0x351f/0x4280 [ 268.029843] ? tcp_mmap+0x150/0x150 [ 268.033483] inet_recvmsg+0x4d0/0x5e0 [ 268.037313] ? security_socket_recvmsg+0x1e0/0x220 [ 268.042262] ? inet_sendpage+0x8b0/0x8b0 [ 268.046358] __sys_recvfrom+0x61e/0x7f0 [ 268.050390] ? __msan_poison_alloca+0x173/0x1f0 [ 268.055088] ? prepare_exit_to_usermode+0x46/0x410 [ 268.060029] ? syscall_return_slowpath+0xdb/0x700 [ 268.064926] __se_sys_recvfrom+0x111/0x130 [ 268.069210] __x64_sys_recvfrom+0x6e/0x90 [ 268.073373] do_syscall_64+0xb8/0x100 [ 268.077196] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 268.082395] RIP: 0033:0x4572a9 [ 268.085603] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.104520] RSP: 002b:00007f2f131ebc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 268.112279] RAX: ffffffffffffffda RBX: 00007f2f131ec6d4 RCX: 00000000004572a9 [ 268.119569] RDX: 6478c8501c739e53 RSI: 0000000020f9cf9b RDI: 0000000000000003 [ 268.126850] RBP: 0000000000930140 R08: 0000000000000000 R09: 000000000000004f [ 268.134130] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 268.141406] R13: 00000000004d4498 R14: 00000000004c8ce4 R15: 0000000000000001 [ 268.149034] Dumping ftrace buffer: [ 268.152574] (ftrace buffer empty) [ 268.156302] Kernel Offset: disabled [ 268.159922] Rebooting in 86400 seconds..