[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 25.146708] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 28.431968] random: sshd: uninitialized urandom read (32 bytes read) [ 28.866740] random: sshd: uninitialized urandom read (32 bytes read) [ 29.615461] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.15.198' (ECDSA) to the list of known hosts. [ 35.324366] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/12 08:26:03 fuzzer started [ 36.770773] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/12 08:26:06 dialing manager at 10.128.0.26:42863 2018/09/12 08:26:06 syscalls: 1 2018/09/12 08:26:06 code coverage: enabled 2018/09/12 08:26:06 comparison tracing: enabled 2018/09/12 08:26:06 setuid sandbox: enabled 2018/09/12 08:26:06 namespace sandbox: enabled 2018/09/12 08:26:06 fault injection: enabled 2018/09/12 08:26:06 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/12 08:26:06 net packed injection: enabled 2018/09/12 08:26:06 net device setup: enabled [ 39.653523] random: crng init done 08:30:00 executing program 0: 08:30:00 executing program 1: 08:30:00 executing program 5: 08:30:00 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)="2f6465762f6e65742f74756eff", 0x200000000000017e, 0x0) write$cgroup_type(r0, &(0x7f0000000000)="74687265616465ffff", 0xfffffee7) 08:30:00 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:00 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") [ 272.057542] IPVS: ftp: loaded support on port[0] = 21 [ 272.081077] IPVS: ftp: loaded support on port[0] = 21 [ 272.081084] IPVS: ftp: loaded support on port[0] = 21 [ 272.112014] IPVS: ftp: loaded support on port[0] = 21 [ 272.154403] IPVS: ftp: loaded support on port[0] = 21 [ 272.176455] IPVS: ftp: loaded support on port[0] = 21 [ 274.431768] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.447810] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.469456] device bridge_slave_0 entered promiscuous mode [ 274.486823] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.499930] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.508769] device bridge_slave_0 entered promiscuous mode [ 274.520702] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.527068] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.537298] device bridge_slave_0 entered promiscuous mode [ 274.545286] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.555229] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.563161] device bridge_slave_0 entered promiscuous mode [ 274.571230] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.577591] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.599369] device bridge_slave_0 entered promiscuous mode [ 274.612272] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.625139] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.633221] device bridge_slave_0 entered promiscuous mode [ 274.650268] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.656851] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.666651] device bridge_slave_1 entered promiscuous mode [ 274.674244] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.684420] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.692551] device bridge_slave_1 entered promiscuous mode [ 274.716542] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.726446] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.734461] device bridge_slave_1 entered promiscuous mode [ 274.746051] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.755373] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.763532] device bridge_slave_1 entered promiscuous mode [ 274.778904] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.785307] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.794243] device bridge_slave_1 entered promiscuous mode [ 274.805181] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 274.816277] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 274.838514] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.844973] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.861273] device bridge_slave_1 entered promiscuous mode [ 274.883275] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 274.910566] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 274.921916] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 274.949494] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 274.960915] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 275.000322] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 275.050352] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 275.081384] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 275.092735] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 275.121342] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 275.341111] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 275.390333] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 275.431058] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 275.471254] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 275.497732] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 275.532716] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 275.564021] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 275.579277] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 275.597826] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 275.645595] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 275.699394] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 275.717503] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 275.838081] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 275.844982] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 275.862932] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 275.872518] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 275.882232] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 275.905608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 275.948934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 275.959282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 275.980684] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 276.006886] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 276.018235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 276.038559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 276.107955] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 276.167059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 276.222607] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 276.255452] team0: Port device team_slave_0 added [ 276.264829] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 276.274523] team0: Port device team_slave_0 added [ 276.319953] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 276.327371] team0: Port device team_slave_0 added [ 276.352323] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 276.368338] team0: Port device team_slave_1 added [ 276.374389] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 276.388852] team0: Port device team_slave_0 added [ 276.396600] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 276.428967] team0: Port device team_slave_0 added [ 276.436892] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 276.449524] team0: Port device team_slave_1 added [ 276.473974] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 276.499155] team0: Port device team_slave_1 added [ 276.511520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.552037] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 276.560739] team0: Port device team_slave_1 added [ 276.568508] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 276.592693] team0: Port device team_slave_1 added [ 276.616095] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.626609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 276.654648] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 276.669490] team0: Port device team_slave_0 added [ 276.675303] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.704289] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.728756] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.751033] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 276.772044] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 276.800629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.815839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 276.853458] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 276.878409] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 276.885833] team0: Port device team_slave_1 added [ 276.907747] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 276.929067] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 276.936941] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 276.955201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.963165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 276.973575] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 276.985892] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 276.996958] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 277.009402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.017355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 277.038790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.046769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 277.071105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.079076] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 277.087318] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 277.094725] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 277.102550] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 277.136587] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 277.159864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 277.188680] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 277.208534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.225032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 277.233357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.241589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 277.249530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.257216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 277.267689] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 277.278550] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 277.296027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 277.338811] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 277.359349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.371169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 277.381778] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 277.398551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.406560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 277.430807] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 277.449287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.459001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 277.594575] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 277.617554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.635518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 278.455600] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.462129] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.469240] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.475620] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.499741] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 278.508238] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.514623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.521355] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.527726] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.539576] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 278.796677] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.803122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.809840] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.816212] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.840326] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 278.855041] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.861467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.868208] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.874579] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.908694] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 278.932307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.949853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.957209] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.986895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 279.023252] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.029670] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.036348] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.042777] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.055875] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 279.084370] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.090774] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.097448] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.103917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.125308] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 279.958105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 279.965372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 283.606657] 8021q: adding VLAN 0 to HW filter on device bond0 [ 283.762271] 8021q: adding VLAN 0 to HW filter on device bond0 [ 283.903114] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.073723] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 284.268738] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.277056] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.298644] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 284.339988] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 284.489657] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.597667] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 284.618875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.625978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.755262] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 284.781044] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 284.787936] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 284.808534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.817410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.858382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.881777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.921658] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 284.987120] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 285.152127] 8021q: adding VLAN 0 to HW filter on device team0 [ 285.252772] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 285.274298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.288210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.302835] 8021q: adding VLAN 0 to HW filter on device team0 [ 285.318936] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 285.346924] 8021q: adding VLAN 0 to HW filter on device team0 [ 285.368854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.375972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.580846] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 285.587028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.598870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.805284] 8021q: adding VLAN 0 to HW filter on device team0 [ 285.817394] 8021q: adding VLAN 0 to HW filter on device team0 [ 286.077248] 8021q: adding VLAN 0 to HW filter on device team0 08:30:16 executing program 0: socket$inet6(0xa, 0x42c9ce6c8adfdc84, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000100)=0x1c, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @remote}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast1}, 'tunl0\x00'}) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) pipe2(&(0x7f0000000000), 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) clock_getres(0x0, &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f0000000380)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000500)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000004500)='team_slave_0\x00'}, 0x30) stat(&(0x7f0000004580)='./file0\x00', &(0x7f00000045c0)) getgroups(0x0, &(0x7f0000004640)) getpid() stat(&(0x7f0000004680)='./file0\x00', &(0x7f00000046c0)) lstat(&(0x7f0000004740)='./file0\x00', &(0x7f0000004780)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000004800), &(0x7f0000004840), &(0x7f0000004880)) connect(0xffffffffffffffff, &(0x7f0000004a40)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80) getgroups(0x0, &(0x7f00000048c0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004a00)={&(0x7f0000000280)=@proc, 0xc, &(0x7f0000004480), 0x0, &(0x7f0000004900)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 08:30:16 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:17 executing program 5: r0 = socket$kcm(0x2, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x541b, 0x0) 08:30:17 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x11, 0x4, 0x400000000004, 0x1}, 0x605) 08:30:17 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:17 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000140)={"62726964676530000000008000", &(0x7f0000000100)=ANY=[@ANYBLOB="120000000000000000c01108000000000202"]}) 08:30:17 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0xffffffffffffffff}, 0xc) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) mount(0xfffffffffffffffd, &(0x7f0000000980)='./file0\x00', &(0x7f0000000300)='a\t\x00\x00\x00q\x00', 0x0, &(0x7f0000000ac0)='\x00') mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='.', &(0x7f00000000c0)='hugetlbfs\x00', 0x0, &(0x7f0000000700)) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000400)={0x18, 0x0, {0x0, @broadcast, 'veth1_to_team\x00'}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000440)) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000b00)='IPVS\x00') stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000003d80)) getuid() prctl$setmm(0x23, 0x0, &(0x7f0000ffb000/0x3000)=nil) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) getuid() getgroups(0x0, &(0x7f0000000880)) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000b40)=ANY=[], &(0x7f00000009c0)) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in={{0x2, 0x0, @loopback}}}, 0x84) lsetxattr$system_posix_acl(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f00000008c0), 0x24, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000002c0), 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005700)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000010c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001640)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000001600)='\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005180)) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005200)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f00000051c0)='#lo\'\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005240)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005540), 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 08:30:17 executing program 1: prctl$setname(0x10, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280)=@assoc_value, &(0x7f00000002c0)=0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f0000000380)={0x0, 0x0, 0x0, &(0x7f0000000340)}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000300)="601f81eb371412b23a946da6afb6f970", 0x10) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 08:30:17 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:17 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:18 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:18 executing program 3: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000080)=@nl=@kern={0x10, 0x7003, 0x6c00000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000240)="5500000018007f0800fe01b2a4a280930a600800ffa84302910000002d00090023000c00030000000d000500fe80000003f6c78b80082314e9030b9d566885b167320b00dc1338d54400009b84136ef75afb83de48", 0x55}], 0x1, &(0x7f0000000080)}, 0x0) 08:30:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x80000, 0x6) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) unshare(0x40000000) r2 = accept4(r1, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x3, @mcast2, 0x8}}, 0x6, 0x5, 0x1ff, 0x3, 0x3e6892f932e1b919}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r3, 0x40, 0x8}, &(0x7f0000000240)=0xc) r4 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r4, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x8001]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0xb) 08:30:18 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) 08:30:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x80000, 0x6) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8070014") r1 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) unshare(0x40000000) r2 = accept4(r1, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x3, @mcast2, 0x8}}, 0x6, 0x5, 0x1ff, 0x3, 0x3e6892f932e1b919}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r3, 0x40, 0x8}, &(0x7f0000000240)=0xc) r4 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r4, 0x29, 0xc8, &(0x7f00000007c0), 0x4) 08:30:18 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) [ 290.205083] netlink: 9 bytes leftover after parsing attributes in process `syz-executor3'. 08:30:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x5}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000d00)=r0, 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r0, 0x4) [ 290.255529] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 290.262302] IPv6: NLM_F_CREATE should be set when creating new route [ 290.268874] IPv6: NLM_F_CREATE should be set when creating new route [ 290.308867] IPVS: ftp: loaded support on port[0] = 21 [ 290.321275] IPVS: ftp: loaded support on port[0] = 21 08:30:18 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000002980)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)="82", 0x1}], 0x1, &(0x7f0000000180)=ANY=[]}, 0x0) [ 290.533432] IPVS: ftp: loaded support on port[0] = 21 [ 290.593520] IPVS: ftp: loaded support on port[0] = 21 08:30:19 executing program 3: r0 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg(r0, &(0x7f0000001380)={&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001280)=""/243, 0xf3}, 0x0) recvmsg(r0, &(0x7f0000000480)={&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000440)=""/5, 0x5}, 0x0) recvmsg$kcm(r0, &(0x7f0000000400)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000600)=""/135, 0x87}, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1, &(0x7f0000000080)}, 0x0) 08:30:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x80000, 0x6) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8070014") r1 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) unshare(0x40000000) r2 = accept4(r1, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x3, @mcast2, 0x8}}, 0x6, 0x5, 0x1ff, 0x3, 0x3e6892f932e1b919}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r3, 0x40, 0x8}, &(0x7f0000000240)=0xc) r4 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r4, 0x29, 0xc8, &(0x7f00000007c0), 0x4) [ 290.963715] IPVS: ftp: loaded support on port[0] = 21 08:30:19 executing program 3: 08:30:19 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) 08:30:19 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:19 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:21 executing program 0: 08:30:21 executing program 3: 08:30:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x80000, 0x6) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8070014") r1 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) unshare(0x40000000) r2 = accept4(r1, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x3, @mcast2, 0x8}}, 0x6, 0x5, 0x1ff, 0x3, 0x3e6892f932e1b919}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r3, 0x40, 0x8}, &(0x7f0000000240)=0xc) r4 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r4, 0x29, 0xc8, &(0x7f00000007c0), 0x4) 08:30:21 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) 08:30:21 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:21 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:21 executing program 3: 08:30:21 executing program 0: [ 293.415184] IPVS: ftp: loaded support on port[0] = 21 08:30:21 executing program 3: 08:30:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'ifb0\x00', {0x2, 0x0, @multicast2}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) clock_nanosleep(0xfe10bed1dc2816c6, 0x0, &(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f0000000040)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) 08:30:22 executing program 3: sched_getparam(0x0, &(0x7f0000000b40)) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0x4) eventfd2(0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") openat$dir(0xffffffffffffff9c, &(0x7f0000000740)='./file0\x00', 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240), &(0x7f0000000500), 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, 0x0) getpgrp(0x0) getpgrp(0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in=@broadcast, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) clock_gettime(0x0, &(0x7f0000000440)) nanosleep(&(0x7f0000000480), &(0x7f00000004c0)) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)={@local}, 0x14) socket$inet_icmp_raw(0x2, 0x3, 0x1) io_setup(0x0, &(0x7f00000001c0)) io_submit(0x0, 0x0, &(0x7f0000000b00)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040), 0x4) 08:30:22 executing program 0: sched_getparam(0x0, &(0x7f0000000b40)) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), 0x4) getresuid(&(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000280)) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) getgroups(0x0, &(0x7f0000000480)) getuid() fstat(0xffffffffffffffff, &(0x7f00000004c0)) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) fstat(0xffffffffffffffff, &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@loopback, @in6=@loopback}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000880)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000900)) getresgid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)) getuid() getgroups(0x0, &(0x7f0000000a40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@local, @in6}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000a80)=0xe8) lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000c80)) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000d00)={0x10}, 0x10) eventfd2(0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") openat$dir(0xffffffffffffff9c, &(0x7f0000000740)='./file0\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 08:30:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x80000, 0x6) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8070014") r1 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) unshare(0x40000000) r2 = accept4(r1, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x3, @mcast2, 0x8}}, 0x6, 0x5, 0x1ff, 0x3, 0x3e6892f932e1b919}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r3, 0x40, 0x8}, &(0x7f0000000240)=0xc) r4 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r4, 0x29, 0xc8, &(0x7f00000007c0), 0x4) [ 293.947396] IPVS: ftp: loaded support on port[0] = 21 08:30:22 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:22 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() 08:30:22 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) 08:30:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x80000, 0x6) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8070014") r1 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) unshare(0x40000000) r2 = accept4(r1, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x3, @mcast2, 0x8}}, 0x6, 0x5, 0x1ff, 0x3, 0x3e6892f932e1b919}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r3, 0x40, 0x8}, &(0x7f0000000240)=0xc) socket$inet6(0xa, 0x3, 0x3a) 08:30:22 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") [ 294.505604] IPVS: ftp: loaded support on port[0] = 21 08:30:22 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180), 0x4) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip_vti0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000006c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000009c0)={@ipv4={[], [], @loopback}}, &(0x7f0000000a00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@remote, @in6=@ipv4={[], [], @local}}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c80)={@loopback}, &(0x7f0000000cc0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000dc0)={0x0, @dev}, &(0x7f0000000e00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e40)={'gre0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'team0\x00'}) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000080)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 08:30:23 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:23 executing program 3: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000340)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) utime(&(0x7f0000000540)='./file0\x00', &(0x7f0000000480)) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) futex(&(0x7f00000000c0), 0x0, 0x4, &(0x7f0000000040)={0x77359400}, &(0x7f00000003c0), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0bd0fef69dc0f01eece738c19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a2664af4472e671fb0703") getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3c8, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xfffffffffffffccb, &(0x7f0000000140)=""/255}, 0xffffff9e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3c4c29539744199c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000080)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000015c0), 0xc) io_setup(0x0, &(0x7f00000002c0)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'tunl0\x00'}) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000002c40)=ANY=[]) signalfd(0xffffffffffffffff, &(0x7f0000001600), 0x100000084) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) dup(0xffffffffffffffff) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:30:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x80000, 0x6) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8070014") r1 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) unshare(0x40000000) r2 = accept4(r1, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x3, @mcast2, 0x8}}, 0x6, 0x5, 0x1ff, 0x3, 0x3e6892f932e1b919}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r3, 0x40, 0x8}, &(0x7f0000000240)=0xc) 08:30:23 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") [ 294.863514] audit: type=1326 audit(1536741023.211:2): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7336 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 294.922845] IPVS: ftp: loaded support on port[0] = 21 08:30:23 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() 08:30:23 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:23 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) 08:30:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x80000, 0x6) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8070014") r1 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) unshare(0x40000000) accept4(r1, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x3, @mcast2, 0x8}}, 0x6, 0x5, 0x1ff, 0x3, 0x3e6892f932e1b919}, &(0x7f0000000140)=0x98) 08:30:23 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") [ 295.397357] IPVS: ftp: loaded support on port[0] = 21 08:30:23 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x80000, 0x6) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8070014") r1 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) unshare(0x40000000) accept4(r1, &(0x7f00000000c0)=@ipx, &(0x7f0000000000)=0x80, 0x80000) [ 295.817565] IPVS: ftp: loaded support on port[0] = 21 08:30:24 executing program 3: request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000440)) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000180)={'bcsf0\x00', @ifru_ivalue}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) inotify_init1(0x0) prctl$void(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x5) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100), &(0x7f0000000140)='nodev\x00', 0xfffffffffffffffd) clock_adjtime(0x0, &(0x7f0000000240)) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 08:30:24 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:24 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x80000, 0x6) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8070014") r1 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) unshare(0x40000000) 08:30:24 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) 08:30:24 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() 08:30:24 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000280), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000400)=0xffffffffffffff27, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f00000002c0)={0x7}, 0x7) memfd_create(&(0x7f0000000300)='/dev/rtc0\x00', 0x0) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) [ 296.219296] IPVS: ftp: loaded support on port[0] = 21 08:30:24 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x80000, 0x6) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8070014") r1 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) 08:30:24 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x80000, 0x6) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8070014") r1 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) 08:30:25 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x80000, 0x6) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8070014") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) 08:30:25 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:25 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:25 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getegid() 08:30:25 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:25 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x80000, 0x6) r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) 08:30:25 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:25 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:25 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) 08:30:25 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:25 executing program 1: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) 08:30:26 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:26 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) 08:30:26 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:26 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:26 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getegid() 08:30:26 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:26 executing program 1: socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) 08:30:26 executing program 1: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x20) 08:30:26 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:26 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:26 executing program 1: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x20) 08:30:26 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:26 executing program 1: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x20) 08:30:27 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:27 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:27 executing program 1: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0x0, 0x1}, 0x20) 08:30:27 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getegid() 08:30:27 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:27 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:27 executing program 1: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff}, 0x20) 08:30:27 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:27 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:27 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:27 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:28 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:28 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:28 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 08:30:28 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:28 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:28 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 08:30:28 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:28 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:28 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:28 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 08:30:28 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:28 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:29 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:29 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:29 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:29 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:29 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:29 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:29 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:29 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 08:30:29 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:29 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:29 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:30 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:30 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:30 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:30 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:30 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:30 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 08:30:30 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:30 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:30 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:31 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:31 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:31 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:31 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 08:30:31 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 08:30:31 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 08:30:31 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 08:30:31 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:31 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:32 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:32 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:32 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:32 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:32 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:32 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:32 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:32 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:32 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:32 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:33 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:33 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:33 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:33 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:33 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:33 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:33 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:34 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:34 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:34 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:34 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:34 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:34 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:34 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:34 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:34 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:34 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:34 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:35 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:35 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:35 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:35 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:35 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:35 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:35 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:35 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:35 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:36 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:36 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:36 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:36 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:36 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:36 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:36 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:36 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:36 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:36 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:37 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:37 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:37 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:37 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:37 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:37 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:37 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:37 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:37 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:38 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:38 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:38 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:38 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:38 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:38 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:38 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:38 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:38 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:38 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:39 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:39 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:39 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:39 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:39 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:39 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:39 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:39 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:39 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:40 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:40 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:40 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:40 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:40 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:40 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:40 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:40 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:40 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:40 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:41 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:41 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:41 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:41 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:41 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:41 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:41 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:41 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:41 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:41 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:42 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:42 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:42 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:42 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:42 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:42 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:42 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:42 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:42 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:42 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:43 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:43 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:43 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:43 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:43 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:43 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:43 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:43 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:43 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:43 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:43 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:44 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:44 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:44 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:44 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:44 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:44 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:44 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:44 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:44 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:44 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:44 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:44 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:44 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:45 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:45 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:45 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) [ 316.690777] audit: type=1326 audit(1536741045.038:3): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8197 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 08:30:45 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:45 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:45 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:45 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") [ 317.033690] audit: type=1326 audit(1536741045.388:4): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8213 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 08:30:45 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) getgid() syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000580)={0x0, @loopback, 0x0, 0x0, 'dh\x00'}, 0x2c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept4(0xffffffffffffff9c, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0x80, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0)=""/24, &(0x7f0000000400)=0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/251) modify_ldt$write(0x1, &(0x7f0000000080), 0x10) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/rpc\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000440)={'veth0_to_bridge\x00', @broadcast}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000280)}}, &(0x7f0000000180)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 08:30:45 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) [ 317.229939] audit: type=1326 audit(1536741045.583:5): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8219 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 08:30:45 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000a00), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @rand_addr=0x3, [0x10000000]}, 0x10) 08:30:45 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:45 executing program 2: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) [ 317.622092] netlink: 180 bytes leftover after parsing attributes in process `syz-executor2'. [ 317.656828] netlink: 180 bytes leftover after parsing attributes in process `syz-executor2'. 08:30:46 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:46 executing program 2: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 08:30:46 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:46 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") [ 317.849848] netlink: 180 bytes leftover after parsing attributes in process `syz-executor2'. 08:30:46 executing program 2: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) [ 318.040915] netlink: 180 bytes leftover after parsing attributes in process `syz-executor2'. 08:30:46 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:46 executing program 2: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 08:30:46 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() [ 318.253589] netlink: 180 bytes leftover after parsing attributes in process `syz-executor2'. 08:30:46 executing program 2: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="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", 0xfc) 08:30:46 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:46 executing program 2: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de02000000000000000175e63fb8d38a873cf1", 0xfc) [ 318.580595] netlink: 180 bytes leftover after parsing attributes in process `syz-executor2'. 08:30:47 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:47 executing program 2: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de02000000000000000175e63fb8d38a873cf1", 0xfc) 08:30:47 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") [ 318.745406] netlink: 180 bytes leftover after parsing attributes in process `syz-executor2'. 08:30:47 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:47 executing program 2: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de02000000000000000175e63fb8d38a873cf1", 0xfc) [ 318.945201] netlink: 180 bytes leftover after parsing attributes in process `syz-executor2'. 08:30:47 executing program 2: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 08:30:47 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) [ 319.188953] netlink: 180 bytes leftover after parsing attributes in process `syz-executor2'. 08:30:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de02000000000000000175e63fb8d38a873cf1", 0xfc) 08:30:47 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() [ 319.368695] netlink: 180 bytes leftover after parsing attributes in process `syz-executor2'. 08:30:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 08:30:47 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 08:30:48 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:48 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 08:30:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 08:30:48 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 08:30:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 08:30:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 08:30:48 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 08:30:48 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:48 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 08:30:49 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x802, 0x0) write(0xffffffffffffffff, &(0x7f0000000200)="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", 0xfc) 08:30:49 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200), 0x0) 08:30:49 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200), 0x0) 08:30:49 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:49 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200), 0x0) 08:30:49 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:49 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:49 executing program 5: keyctl$set_reqkey_keyring(0x11, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:49 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b", 0x7e) 08:30:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b", 0x7e) 08:30:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b", 0x7e) 08:30:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b", 0xbd) 08:30:50 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b", 0xbd) 08:30:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b", 0xbd) 08:30:50 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b035", 0xdd) 08:30:50 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:50 executing program 5: keyctl$set_reqkey_keyring(0x11, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b035", 0xdd) 08:30:50 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b035", 0xdd) 08:30:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de020000", 0xed) 08:30:51 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de020000", 0xed) 08:30:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de020000", 0xed) 08:30:51 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:51 executing program 5: keyctl$set_reqkey_keyring(0x11, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de02000000000000000175e6", 0xf5) 08:30:51 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:51 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de02000000000000000175e6", 0xf5) 08:30:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de02000000000000000175e6", 0xf5) 08:30:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de02000000000000000175e63fb8d38a", 0xf9) 08:30:52 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de02000000000000000175e63fb8d38a", 0xf9) 08:30:52 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000240)) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="fc0000004a000700ab092500090007000aab80ff010000000000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de02000000000000000175e63fb8d38a", 0xf9) 08:30:52 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:52 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfb) 08:30:52 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:52 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfb) 08:30:52 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:53 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:53 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfb) 08:30:53 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:53 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:53 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x2d, &(0x7f0000000040), 0x0, &(0x7f0000000140)}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='E'], &(0x7f0000000240)="73797a6b61316e2f6c6c655000013539b16641b91b4e1d2155ed61062f4b5e957fe98067078846268a229346584319562c2fb9ae56b23ebe12a9f3348b595d662ad6baf8ee1db0f3a596204f02c93033a5627ca31d6f83b83da9dd59418c95851954188ace028ca9118163036aa6992ce47588351cf8fecec136367245e2d664c613483bc28ea2be7e37a80163f4e93d0e72191294eba6663bdcb740f3ef83", 0x0, 0xce, &(0x7f0000000140)=""/206}, 0x48) socketpair(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8946, &(0x7f0000000000)) 08:30:53 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:53 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:53 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:53 executing program 2: socketpair(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8994, &(0x7f0000000000)) 08:30:53 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:53 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:53 executing program 2: ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) unshare(0x20000000) clone(0x0, &(0x7f0000000200), &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000000200)) clone(0xe828900, &(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000040)) 08:30:54 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() 08:30:54 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 08:30:54 executing program 3: prctl$setname(0x59616d61, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) 08:30:54 executing program 2: ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) unshare(0x20000000) clone(0x0, &(0x7f0000000200), &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000000200)) clone(0xe828900, &(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000040)) 08:30:54 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) [ 325.959491] audit: type=1326 audit(1536741054.313:6): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8577 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 08:30:54 executing program 0: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:54 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) [ 326.168444] audit: type=1326 audit(1536741054.523:7): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8593 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 08:30:54 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpgid(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getegid() geteuid() getresgid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) getresuid(&(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003380), &(0x7f00000033c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003400)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) fstat(0xffffffffffffffff, &(0x7f0000003ac0)) getresuid(&(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)) getgroups(0x0, &(0x7f0000003c00)) stat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000009c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresgid(&(0x7f0000003f00), &(0x7f0000005800), &(0x7f0000005840)) lstat(&(0x7f0000004400)='./file0/file0\x00', &(0x7f0000004440)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004640)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) stat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) lstat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005100)={{{@in6, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000005200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005240)) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000002c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@loopback, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000005480)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005600), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c7a3a3efe9dc0f01eece73fe19fa380f3666450f3829057c0000001af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cadae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 08:30:54 executing program 2: ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) unshare(0x20000000) clone(0x0, &(0x7f0000000200), &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000000200)) clone(0xe828900, &(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000040)) 08:30:54 executing program 5: keyctl$set_reqkey_keyring(0x11, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) [ 326.379551] audit: type=1326 audit(1536741054.733:8): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8604 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 08:30:54 executing program 2: ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) unshare(0x20000000) clone(0x0, &(0x7f0000000200), &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000000200)) clone(0xe828900, &(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000040)) 08:30:54 executing program 5: clock_gettime(0x6, &(0x7f00000001c0)) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000340)) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000400), &(0x7f0000000440)=0xb) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f00000002c0)={0xf, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000006c0)={0x0, 0xffffff45, 0xfa00, {0x0, &(0x7f0000000680)}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000700)={0xf, 0x8}, 0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200), &(0x7f0000000140)=0x8) fstat(0xffffffffffffffff, &(0x7f0000000380)) setuid(0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480)=""/216, &(0x7f0000000580)=0xd8) fsync(0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f00000005c0)}, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000300), 0x20) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 08:30:54 executing program 4: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) clock_gettime(0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000880)={0x7e, 0x7d, 0x0, {{0x0, 0x5c, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x9, "6b657972696e671140", 0x12, '/dev/loop-control\x00', 0x7, 'filter\x00', 0x7, 'filter\x00'}, 0xd, 'vboxnet0wlan1'}}, 0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000001c0)='syz1\x00') syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000380)=""/161, 0xa1, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)) execveat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000a80), &(0x7f0000000b40), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getegid() [ 326.691663] ================================================================== [ 326.699338] BUG: KASAN: use-after-free in mqueue_get_tree+0x2ac/0x2e0 [ 326.705936] Read of size 8 at addr ffff8801d7ae1394 by task syz-executor2/8611 [ 326.713310] [ 326.714993] CPU: 1 PID: 8611 Comm: syz-executor2 Not tainted 4.19.0-rc3-next-20180912+ #72 [ 326.723437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.732829] Call Trace: [ 326.735562] dump_stack+0x1d3/0x2c4 [ 326.739256] ? dump_stack_print_info.cold.2+0x52/0x52 [ 326.744568] ? printk+0xa7/0xcf [ 326.747890] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 326.752774] print_address_description.cold.8+0x9/0x1ff [ 326.758217] kasan_report.cold.9+0x242/0x309 [ 326.762653] ? mqueue_get_tree+0x2ac/0x2e0 [ 326.766921] __asan_report_load8_noabort+0x14/0x20 [ 326.771893] mqueue_get_tree+0x2ac/0x2e0 [ 326.776611] vfs_get_tree+0x1cb/0x5c0 [ 326.780435] mq_create_mount+0xe3/0x190 [ 326.784466] mq_init_ns+0x15a/0x210 [ 326.788137] copy_ipcs+0x3d2/0x580 [ 326.791707] ? ipcns_get+0xe0/0xe0 [ 326.795355] ? do_mount+0x1db0/0x1db0 [ 326.799169] ? kmem_cache_alloc+0x33a/0x730 [ 326.803561] ? copy_namespaces+0x1f6/0x4d0 [ 326.807819] create_new_namespaces+0x376/0x900 [ 326.812421] ? sys_ni_syscall+0x20/0x20 [ 326.816648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.822306] ? ns_capable_common+0x13f/0x170 [ 326.826776] copy_namespaces+0x3ff/0x4d0 [ 326.830848] ? create_new_namespaces+0x900/0x900 [ 326.835616] ? kasan_check_write+0x14/0x20 [ 326.839959] ? do_raw_spin_lock+0xc1/0x200 [ 326.844276] copy_process+0x4e06/0x8780 [ 326.848315] ? find_held_lock+0x36/0x1c0 [ 326.852412] ? __cleanup_sighand+0x70/0x70 [ 326.856738] ? compat_start_thread+0x80/0x80 [ 326.861205] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 326.866820] ? page_trans_huge_map_swapcount+0xbae/0x1270 [ 326.872385] ? page_swapcount+0x1d0/0x1d0 [ 326.876600] ? preempt_notifier_register+0x200/0x200 [ 326.881828] ? __switch_to_asm+0x34/0x70 [ 326.885913] ? __switch_to_asm+0x40/0x70 [ 326.890015] ? __switch_to_asm+0x34/0x70 [ 326.894088] ? __switch_to_asm+0x40/0x70 [ 326.898164] ? __switch_to_asm+0x34/0x70 [ 326.902276] ? __switch_to_asm+0x40/0x70 [ 326.906348] ? __switch_to_asm+0x34/0x70 [ 326.910471] ? __switch_to_asm+0x40/0x70 [ 326.914546] ? __switch_to_asm+0x34/0x70 [ 326.918639] ? __switch_to_asm+0x40/0x70 [ 326.922732] ? __switch_to_asm+0x34/0x70 [ 326.926863] ? __sched_text_start+0x8/0x8 [ 326.931054] ? graph_lock+0x170/0x170 [ 326.934901] ? plist_check_list+0xa0/0xa0 [ 326.939107] ? __schedule+0x874/0x1ed0 [ 326.943100] ? print_usage_bug+0xc0/0xc0 [ 326.947182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.952739] ? reuse_swap_page+0x4bd/0x1520 [ 326.957081] ? swp_swapcount+0x530/0x530 [ 326.961157] ? __might_sleep+0x95/0x190 [ 326.965207] ? __lock_acquire+0x7ec/0x4ec0 [ 326.969506] ? kasan_check_write+0x14/0x20 [ 326.973802] ? mark_held_locks+0x130/0x130 [ 326.978074] ? graph_lock+0x170/0x170 [ 326.981933] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 326.987154] ? find_held_lock+0x36/0x1c0 [ 326.991305] ? do_wp_page+0xa6f/0x1390 [ 326.995214] ? lock_downgrade+0x900/0x900 [ 326.999474] ? wake_up_page_bit+0x6f0/0x6f0 [ 327.003848] ? kasan_check_read+0x11/0x20 [ 327.008022] ? do_raw_spin_unlock+0xa7/0x2f0 [ 327.012445] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 327.017158] ? pgd_free+0x380/0x380 [ 327.020839] ? __lock_acquire+0x7ec/0x4ec0 [ 327.025115] ? _raw_spin_unlock+0x2c/0x50 [ 327.029277] ? do_wp_page+0x77c/0x1390 [ 327.033201] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 327.037926] ? lock_release+0x970/0x970 [ 327.041931] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.047541] ? kasan_check_write+0x14/0x20 [ 327.051821] ? do_raw_spin_lock+0xc1/0x200 [ 327.056074] ? __handle_mm_fault+0x9ab/0x53e0 [ 327.060625] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 327.065518] ? graph_lock+0x170/0x170 [ 327.069344] ? print_usage_bug+0xc0/0xc0 [ 327.073428] ? wake_up_new_task+0x6fb/0xd20 [ 327.077809] ? kasan_check_read+0x11/0x20 [ 327.081974] ? graph_lock+0x170/0x170 [ 327.085826] ? graph_lock+0x170/0x170 [ 327.089641] ? graph_lock+0x170/0x170 [ 327.093481] _do_fork+0x1cb/0x11d0 [ 327.097047] ? fork_idle+0x1d0/0x1d0 [ 327.100775] ? lock_downgrade+0x900/0x900 [ 327.104945] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 327.110501] ? handle_mm_fault+0x56e/0xc70 [ 327.114751] ? __handle_mm_fault+0x53e0/0x53e0 [ 327.119398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.125066] ? __do_page_fault+0x4a6/0xed0 [ 327.129355] ? do_syscall_64+0x9a/0x820 [ 327.133344] ? do_syscall_64+0x9a/0x820 [ 327.137338] ? lockdep_hardirqs_on+0x421/0x5c0 [ 327.142017] ? trace_hardirqs_on+0xbd/0x310 [ 327.146361] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.151756] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 327.157223] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.162791] __x64_sys_clone+0xbf/0x150 [ 327.166792] do_syscall_64+0x1b9/0x820 [ 327.170693] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 327.170720] ? syscall_return_slowpath+0x5e0/0x5e0 [ 327.170741] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 327.170760] ? trace_hardirqs_on_caller+0x310/0x310 [ 327.170774] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 327.170788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.170801] ? prepare_exit_to_usermode+0x291/0x3b0 [ 327.170819] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 327.170842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.181260] RIP: 0033:0x4572d9 [ 327.181277] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.181285] RSP: 002b:00007f2ce339cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 327.181300] RAX: ffffffffffffffda RBX: 00007f2ce339d6d4 RCX: 00000000004572d9 [ 327.181309] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 000000000e828900 [ 327.181318] RBP: 00000000009300a0 R08: 0000000020000040 R09: 0000000000000000 [ 327.181326] R10: 0000000020000140 R11: 0000000000000246 R12: 00000000ffffffff [ 327.181335] R13: 00000000004cbe68 R14: 00000000004c36da R15: 0000000000000000 [ 327.181357] [ 327.284639] Allocated by task 7240: [ 327.288276] save_stack+0x43/0xd0 [ 327.291732] kasan_kmalloc+0xc7/0xe0 [ 327.295452] kasan_slab_alloc+0x12/0x20 [ 327.299444] kmem_cache_alloc+0x12e/0x730 [ 327.303706] copy_net_ns+0x15b/0x4a0 [ 327.307431] create_new_namespaces+0x6ad/0x900 [ 327.312042] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 327.316982] ksys_unshare+0x79c/0x10b0 [ 327.320878] __x64_sys_unshare+0x31/0x40 [ 327.324947] do_syscall_64+0x1b9/0x820 [ 327.328839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.334027] [ 327.335655] Freed by task 5896: [ 327.338937] save_stack+0x43/0xd0 [ 327.342394] __kasan_slab_free+0x102/0x150 [ 327.346641] kasan_slab_free+0xe/0x10 [ 327.350451] kmem_cache_free+0x83/0x290 [ 327.354446] net_drop_ns.part.14+0x129/0x150 [ 327.358873] cleanup_net+0x849/0xb10 [ 327.362672] process_one_work+0xc90/0x1b90 [ 327.366932] worker_thread+0x17f/0x1390 [ 327.370921] kthread+0x35a/0x420 [ 327.374300] ret_from_fork+0x3a/0x50 [ 327.378006] [ 327.379647] The buggy address belongs to the object at ffff8801d7ae0080 [ 327.379647] which belongs to the cache net_namespace(81:syz1) of size 8576 [ 327.393380] The buggy address is located 4884 bytes inside of [ 327.393380] 8576-byte region [ffff8801d7ae0080, ffff8801d7ae2200) [ 327.405440] The buggy address belongs to the page: [ 327.410397] page:ffffea00075eb800 count:1 mapcount:0 mapping:ffff8801c8572200 index:0x0 compound_mapcount: 0 [ 327.420396] flags: 0x2fffc0000008100(slab|head) [ 327.425082] raw: 02fffc0000008100 ffffea0005819808 ffffea00057b5908 ffff8801c8572200 [ 327.432987] raw: 0000000000000000 ffff8801d7ae0080 0000000100000001 ffff8801be134840 [ 327.440870] page dumped because: kasan: bad access detected [ 327.446606] page->mem_cgroup:ffff8801be134840 [ 327.451101] [ 327.452720] Memory state around the buggy address: [ 327.457664] ffff8801d7ae1280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 327.465041] ffff8801d7ae1300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 327.472409] >ffff8801d7ae1380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 327.479768] ^ [ 327.483657] ffff8801d7ae1400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 327.491024] ffff8801d7ae1480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 327.498379] ================================================================== [ 327.505739] Disabling lock debugging due to kernel taint [ 327.511399] Kernel panic - not syncing: panic_on_warn set ... [ 327.511399] [ 327.518805] CPU: 1 PID: 8611 Comm: syz-executor2 Tainted: G B 4.19.0-rc3-next-20180912+ #72 [ 327.528602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.537986] Call Trace: [ 327.540598] dump_stack+0x1d3/0x2c4 [ 327.544233] ? dump_stack_print_info.cold.2+0x52/0x52 [ 327.549435] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 327.554213] panic+0x238/0x4e7 [ 327.557414] ? add_taint.cold.5+0x16/0x16 [ 327.559488] kobject: 'loop0' (00000000e092090a): kobject_uevent_env [ 327.561583] ? trace_hardirqs_on+0xb4/0x310 [ 327.572535] kasan_end_report+0x47/0x4f [ 327.572557] kobject: 'loop0' (00000000e092090a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 327.576541] kasan_report.cold.9+0x76/0x309 [ 327.576558] ? mqueue_get_tree+0x2ac/0x2e0 [ 327.576579] __asan_report_load8_noabort+0x14/0x20 [ 327.599961] mqueue_get_tree+0x2ac/0x2e0 [ 327.604268] vfs_get_tree+0x1cb/0x5c0 [ 327.608087] mq_create_mount+0xe3/0x190 [ 327.612324] mq_init_ns+0x15a/0x210 [ 327.615964] copy_ipcs+0x3d2/0x580 [ 327.619738] ? ipcns_get+0xe0/0xe0 [ 327.623452] ? do_mount+0x1db0/0x1db0 [ 327.627273] ? kmem_cache_alloc+0x33a/0x730 [ 327.631611] ? copy_namespaces+0x1f6/0x4d0 [ 327.636054] create_new_namespaces+0x376/0x900 [ 327.640851] ? sys_ni_syscall+0x20/0x20 [ 327.644835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.650507] ? ns_capable_common+0x13f/0x170 [ 327.655055] copy_namespaces+0x3ff/0x4d0 [ 327.659125] ? create_new_namespaces+0x900/0x900 [ 327.663883] ? kasan_check_write+0x14/0x20 [ 327.668119] ? do_raw_spin_lock+0xc1/0x200 [ 327.672576] copy_process+0x4e06/0x8780 [ 327.676573] ? find_held_lock+0x36/0x1c0 [ 327.680825] ? __cleanup_sighand+0x70/0x70 [ 327.685058] ? compat_start_thread+0x80/0x80 [ 327.689835] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.695380] ? page_trans_huge_map_swapcount+0xbae/0x1270 [ 327.701168] ? page_swapcount+0x1d0/0x1d0 [ 327.705321] ? preempt_notifier_register+0x200/0x200 [ 327.710630] ? __switch_to_asm+0x34/0x70 [ 327.714965] ? __switch_to_asm+0x40/0x70 [ 327.719045] ? __switch_to_asm+0x34/0x70 [ 327.723437] ? __switch_to_asm+0x40/0x70 [ 327.727511] ? __switch_to_asm+0x34/0x70 [ 327.731585] ? __switch_to_asm+0x40/0x70 [ 327.735877] ? __switch_to_asm+0x34/0x70 [ 327.740041] ? __switch_to_asm+0x40/0x70 [ 327.744117] ? __switch_to_asm+0x34/0x70 [ 327.748217] ? __switch_to_asm+0x40/0x70 [ 327.752280] ? __switch_to_asm+0x34/0x70 [ 327.756685] ? __sched_text_start+0x8/0x8 [ 327.760862] ? graph_lock+0x170/0x170 [ 327.764662] ? plist_check_list+0xa0/0xa0 [ 327.769060] ? __schedule+0x874/0x1ed0 [ 327.772976] ? print_usage_bug+0xc0/0xc0 [ 327.777778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.783317] ? reuse_swap_page+0x4bd/0x1520 [ 327.787638] ? swp_swapcount+0x530/0x530 [ 327.791702] ? __might_sleep+0x95/0x190 [ 327.795679] ? __lock_acquire+0x7ec/0x4ec0 [ 327.799918] ? kasan_check_write+0x14/0x20 [ 327.804182] ? mark_held_locks+0x130/0x130 [ 327.808437] ? graph_lock+0x170/0x170 [ 327.812269] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 327.817498] ? find_held_lock+0x36/0x1c0 [ 327.821578] ? do_wp_page+0xa6f/0x1390 [ 327.825477] ? lock_downgrade+0x900/0x900 [ 327.829640] ? wake_up_page_bit+0x6f0/0x6f0 [ 327.833966] ? kasan_check_read+0x11/0x20 [ 327.838119] ? do_raw_spin_unlock+0xa7/0x2f0 [ 327.842533] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 327.847120] ? pgd_free+0x380/0x380 [ 327.850748] ? __lock_acquire+0x7ec/0x4ec0 [ 327.854989] ? _raw_spin_unlock+0x2c/0x50 [ 327.859145] ? do_wp_page+0x77c/0x1390 [ 327.863041] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 327.867719] ? lock_release+0x970/0x970 [ 327.871701] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.877244] ? kasan_check_write+0x14/0x20 [ 327.881487] ? do_raw_spin_lock+0xc1/0x200 [ 327.885728] ? __handle_mm_fault+0x9ab/0x53e0 [ 327.890225] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 327.895082] ? graph_lock+0x170/0x170 [ 327.898880] ? print_usage_bug+0xc0/0xc0 [ 327.902943] ? wake_up_new_task+0x6fb/0xd20 [ 327.907277] ? kasan_check_read+0x11/0x20 [ 327.911440] ? graph_lock+0x170/0x170 [ 327.915257] ? graph_lock+0x170/0x170 [ 327.919071] ? graph_lock+0x170/0x170 [ 327.922880] _do_fork+0x1cb/0x11d0 [ 327.926425] ? fork_idle+0x1d0/0x1d0 [ 327.930148] ? lock_downgrade+0x900/0x900 [ 327.934305] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 327.939844] ? handle_mm_fault+0x56e/0xc70 [ 327.944088] ? __handle_mm_fault+0x53e0/0x53e0 [ 327.948685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.954224] ? __do_page_fault+0x4a6/0xed0 [ 327.958473] ? do_syscall_64+0x9a/0x820 [ 327.962449] ? do_syscall_64+0x9a/0x820 [ 327.966447] ? lockdep_hardirqs_on+0x421/0x5c0 [ 327.971046] ? trace_hardirqs_on+0xbd/0x310 [ 327.975366] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.980743] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 327.986202] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.991754] __x64_sys_clone+0xbf/0x150 [ 327.995739] do_syscall_64+0x1b9/0x820 [ 327.999629] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 328.005005] ? syscall_return_slowpath+0x5e0/0x5e0 [ 328.009957] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 328.014808] ? trace_hardirqs_on_caller+0x310/0x310 [ 328.019830] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 328.024876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.030415] ? prepare_exit_to_usermode+0x291/0x3b0 [ 328.035432] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 328.040290] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.045482] RIP: 0033:0x4572d9 [ 328.048678] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.067580] RSP: 002b:00007f2ce339cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 328.075295] RAX: ffffffffffffffda RBX: 00007f2ce339d6d4 RCX: 00000000004572d9 [ 328.082568] RDX: 00000000200001c0 RSI: 0000000020000080 RDI: 000000000e828900 [ 328.089834] RBP: 00000000009300a0 R08: 0000000020000040 R09: 0000000000000000 [ 328.106929] R10: 0000000020000140 R11: 0000000000000246 R12: 00000000ffffffff [ 328.114199] R13: 00000000004cbe68 R14: 00000000004c36da R15: 0000000000000000 [ 328.122431] Kernel Offset: disabled [ 328.126064] Rebooting in 86400 seconds..